加强电子服务:探索数字签名系统的最佳安全性

V. P. Sushma, A. Suresh Kumar
{"title":"加强电子服务:探索数字签名系统的最佳安全性","authors":"V. P. Sushma, A. Suresh Kumar","doi":"10.59256/ijsreat.20240402009","DOIUrl":null,"url":null,"abstract":": E-government, e-learning, e-shopping, and e-voting are examples of electronic processes whose efficacy depends on the security, legitimacy, and integrity of the data that is sent back and forth between users. Sensitive material must be extensively vetted by its intended recipient and digitally signed by its original sender in order to meet these benchmarks. Digital signature systems, which are based on intricate cryptographic formulas, are necessary to guarantee the dependability of these electronic services. However, a number of variables, like key and block sizes, computational complexity, security settings, and modifications unique to a given application, affect how well these services function. The goal of the present research was to identify the ideal level of security for electronic mechanisms through a thorough investigation of industry-standard digital signature systems by the authors. They also looked into possible uses in many fields to improve comprehension and application in real-world situations. Key Word: EDMS, Digital Signature, HD5 algorithm, SHA algorithm.","PeriodicalId":310227,"journal":{"name":"International Journal Of Scientific Research In Engineering & Technology","volume":"27 2","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing Electronic Services: Exploring the Optimal Security of Digital Signature Systems\",\"authors\":\"V. P. Sushma, A. Suresh Kumar\",\"doi\":\"10.59256/ijsreat.20240402009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": E-government, e-learning, e-shopping, and e-voting are examples of electronic processes whose efficacy depends on the security, legitimacy, and integrity of the data that is sent back and forth between users. Sensitive material must be extensively vetted by its intended recipient and digitally signed by its original sender in order to meet these benchmarks. Digital signature systems, which are based on intricate cryptographic formulas, are necessary to guarantee the dependability of these electronic services. However, a number of variables, like key and block sizes, computational complexity, security settings, and modifications unique to a given application, affect how well these services function. The goal of the present research was to identify the ideal level of security for electronic mechanisms through a thorough investigation of industry-standard digital signature systems by the authors. They also looked into possible uses in many fields to improve comprehension and application in real-world situations. Key Word: EDMS, Digital Signature, HD5 algorithm, SHA algorithm.\",\"PeriodicalId\":310227,\"journal\":{\"name\":\"International Journal Of Scientific Research In Engineering & Technology\",\"volume\":\"27 2\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-03-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal Of Scientific Research In Engineering & Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.59256/ijsreat.20240402009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal Of Scientific Research In Engineering & Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59256/ijsreat.20240402009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

:电子政务、电子学习、电子购物和电子投票都是电子程序的例子,其有效性取决于用户之间来回发送数据的安全性、合法性和完整性。敏感资料必须经过目标接收者的广泛审查,并由原始发送者进行数字签名,才能达到这些基准。数字签名系统以复杂的密码公式为基础,是保证这些电子服务可靠性的必要条件。然而,许多变量,如密钥和区块大小、计算复杂性、安全设置以及特定应用的独特修改,都会影响这些服务的功能。本研究的目标是通过作者对行业标准数字签名系统的深入调查,确定电子机制的理想安全级别。他们还研究了许多领域的可能用途,以提高对实际情况的理解和应用。关键字EDMS、数字签名、HD5 算法、SHA 算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Enhancing Electronic Services: Exploring the Optimal Security of Digital Signature Systems
: E-government, e-learning, e-shopping, and e-voting are examples of electronic processes whose efficacy depends on the security, legitimacy, and integrity of the data that is sent back and forth between users. Sensitive material must be extensively vetted by its intended recipient and digitally signed by its original sender in order to meet these benchmarks. Digital signature systems, which are based on intricate cryptographic formulas, are necessary to guarantee the dependability of these electronic services. However, a number of variables, like key and block sizes, computational complexity, security settings, and modifications unique to a given application, affect how well these services function. The goal of the present research was to identify the ideal level of security for electronic mechanisms through a thorough investigation of industry-standard digital signature systems by the authors. They also looked into possible uses in many fields to improve comprehension and application in real-world situations. Key Word: EDMS, Digital Signature, HD5 algorithm, SHA algorithm.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Study on low power ADC Design using Memristor on Embedded systems A Study on Unified Modelling Approach for Memristor: Next Generation Semiconductor Devices Design and Analysis of the Exhaust Muffler for Two-Wheeler Vehicle Intelligent Space: Enhancing Living Environment with Smart Technology (Smart Room) Smart Waste Management System Using IoT
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1