Digital Signature and Hash Function Irregularity


Tuba M.

8th WSEAS International Conference on Telecommunications and Informatics, İstanbul, Türkiye, 30 Mayıs - 01 Haziran 2009, ss.169-170 identifier

  • Basıldığı Şehir: İstanbul
  • Basıldığı Ülke: Türkiye
  • Sayfa Sayıları: ss.169-170

Özet

Use of computer networks is expanding in many important areas such as e-government, c-business, e-learning etc. In any Such communications network it is crucial to be able to authenticate both the contents and the origin of a message. Digital signatures (based on public key schemas) are used for authentication and I ideally, I they Should provide the same guarantees as I handwritten signatures unforgeability (only the author of a message should be able to sign his name to a message), undentability (the author of a message Should not be able to deny lie signed it at a later stage) and authentication (the signature should allow the contents of the message to be authenticated)