Digital Signature

Only available on StudyMode
  • Topic: Digital signature, Cryptographic hash function, Public-key cryptography
  • Pages : 10 (2296 words )
  • Download(s) : 199
  • Published : September 8, 2010
Open Document
Text Preview
Digital Signatures

CONTENTS

1. ABSTRACT
2. INTRODUCTION
3. DESIGN PRINCIPLES & EXPLANATION
3.1. MODULES
3.2. MODULE DESCRIPTIOIN
4. PROJECT DICTIONARY
4.1. DATAFLOW DIAGRAMS
5. FORMS & REPORTS
5.1. I/O SAMPLES
6. BIBILIOGRAPHY

1. ABSTRACT
The security of information available to an organization was primarily provided through physical and administrative means. For example, rugged file cabinets with a combination lock were used for storing sensitive documents and personnel screening procedures were employed during the hiring process. With the introduction of the computer, the need for automated tools for protecting files and other information stored on the computer became evident. This is especially the case for a shared system and the need is even more acute for a network. Computer networks were primarily used by university researches for sending e-mail, and by corporate employees for sharing printers. Under these conditions, security was not given much attention. Today, since the world is going global, and trillions of data are transferred daily across networks, security is looming on the horizon as a potentially massive problem. The generic name for the collection of tools designed to protect data and to thwart hackers is Computer Security.

In the project titled “Digital Signatures” security is ensured in the Messaging System of an organization. In this application, if an employee wishes to send confidential information to another employee connected through the intranet of their organization, he first signs the message and then sends it to the recipient. He signs the message using Digital Signatures. The person who receives the message validates the sender and if the message is from an authorized employee, he reads the message. The above operation is performed using Digital Signature Algorithm (DSA). This application makes sure that the security services Authentication, Secrecy, Integrity, and Non-repudiation are provided to the user. Therefore, intruders cannot gain access to classified information. 2. INTRODUCTION

Scope
The project is confined to the intranet in an organization. This application makes sure that security services such as secrecy, authentication, integrity and non-repudiation are provided to the communicating parties. Objective

This project has been developed keeping in view the security features that need to be implemented in the networks following the fulfillment of these objectives:

• To develop an application that deals with the security threats that arise in the network. • To enable the end-users as well as the organizations come out with a safe messaging communication without any threats from intruders or unauthorized people. • To deal with the four inter-related areas of network security namely Secrecy, Authentication, Non-repudiation and Integrity. Project Overview

This application makes use of Digital Signature Algorithm (DSA) along with a hash function. The hash code is provided as input to a signature function along with a random number generated for this particular signature. The signature function also depends on the sender’s private key and a set of parameters known to a group of communicating principals. This set constitutes a global public key. The result is a signature consisting of two components.

At the receiving end, verification is performed. The receiver generates a quantity that is a function of the public-key components, the sender’s public key, and the hash code of the incoming message. If this quantity matches with one of the components of the signature, then the signature is validated. This application makes sure that the security services Authentication, Secrecy, Integrity, and Non-repudiation are provided to the user.

• This application allows to keep the information out of the hands of unauthorized persons. This is called Secrecy.

• It also deals with determining whom...
tracking img