19-01-2013, 04:52 PM
NETWORK SECURITY ON Digital Signatures
NETWORK SECURITY.doc (Size: 67.5 KB / Downloads: 26)
ABSTRACT
Our objective is to provide the tools for certifying the origin of the file where it come from. When transferring important documents it is often necessary to certify in a reliable way who is actually the sender of a given document. One approach for certifying the origin of documents and files is by using the digital signature.
The digital signing is a mechanism for certifying the origin and the integrity of transmitted information. In the process of digitally signing, additional information called digital signature is added to the given document, calculated using the contents of the document and some private key. At a later stage, this information can be used to check the origin of the signed document.
INTRODUCTION:
Our objective is to provide the authentication for certifying the origin of the file where it comes from. When transferring important documents electronically, it is often necessary to certify in a reliable way who is actually the sender of a given document. One approach for certifying the origin of documents and files is by using the so-called digital signature.
Need for Digital Signatures:
Unlike paper documents, digital documents - such as Word documents and e-mail messages have little to vouch for their authenticity and integrity. For example, e-mails do not have the identifying components that are found in a letter, such as letterhead, address of the recipient, date and traditional hand-written signature. It is also easy to forge message headers so that they appear to come from someone else.
In this environment there are circumstances when it is important for the recipient to be confident that the message has come from the person it seems to have come from and also that it has not been altered in transit. With the growing use of attachments to distribute information, it has become more important to be able to identify the sender of an e-mail message. The risk of viruses from attachments means that people will only want to open attachments from a trusted source.
DIGITAL SIGNATURE GENERATION:
The following procedure is involved in the digital signature generation,
If a sender wants to send receiver a text message, with digital signature, first the sender creates the text message to be signed and generates a hashed message using the message digest function. Message digest function is a mathematical function that generates a 160-bit hash code.
The hash code has the property that we can generate the hash code from original message but we can not generate original message from the hash code. Once sender has the hashed message he uses the public key cryptographic algorithm and his private key to sign the hash to generate the digital signature .The signed document is sent to the receiver.
CONCLUSION:
With the advancement in technology, it is expected to get even more reliable media for communication. Our system will provide one extra layer of authentication for communication.
One application is used for certifying the origin of documents and files is by using the digital signature. It is important for the developer to give conclusions or state the results of his work. This application will transfer the message with authentication provided with in it. It will fulfill all the needs for a reliable transfer by using efficient digital signature algorithms.