Observations on the Theory of Digital Signatures and Cryptographic Hash Functions

As the demand for effective information protection grows, security has become the primary concern in protecting such data from attackers. Cryptography is one of the methods for safeguarding such information. It is a method of storing and distributing data in a specific format that can only be read a...

Full description

Saved in:
Bibliographic Details
Published in:2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) pp. 1 - 5
Main Authors: Bodapati, Nagaeswari, Pooja, N., Varshini, E. Amrutha, Jyothi, R. Naga Sravana
Format: Conference Proceeding
Language:English
Published: IEEE 20-01-2022
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:As the demand for effective information protection grows, security has become the primary concern in protecting such data from attackers. Cryptography is one of the methods for safeguarding such information. It is a method of storing and distributing data in a specific format that can only be read and processed by the intended recipient. It offers a variety of security services like integrity, authentication, confidentiality and non-repudiation, Malicious. Confidentiality service is required for preventing disclosure of information to unauthorized parties. In this paper, there are no ideal hash functions that dwell in digital signature concepts is proved.
DOI:10.1109/ICSSIT53264.2022.9716495