Digital Signature Verification with Etoken Based Authentication in Local Area Network

International Journal of Computer Science and Engineering
© 2018 by SSRG - IJCSE Journal
Volume 5 Issue 8
Year of Publication : 2018
Authors : Ms.P.Abinaya, M.Mariselvi, M.Veeralakshmi, A.Shanthi, M.Nandhinishree

pdf
How to Cite?

Ms.P.Abinaya, M.Mariselvi, M.Veeralakshmi, A.Shanthi, M.Nandhinishree, "Digital Signature Verification with Etoken Based Authentication in Local Area Network," SSRG International Journal of Computer Science and Engineering , vol. 5,  no. 8, pp. 19-22, 2018. Crossref, https://doi.org/10.14445/23488387/IJCSE-V5I8P105

Abstract:

In this paper, we are proposing the automatic generation of digital signatures by using the newly developed digital signature algorithm BS-PDSS(Probabilistic Digital Signature Scheme) in the templates like Microsoft Word, Excel and PowerPoint with the additional security as the E-Token based authentication. This BS-PDSS algorithm will make use of two dissimilar crypto-graphic assumptions as Integer Factorization (IF) and Discrete Logarithm (DL). Nowadays security is the more important in areas like army and navy and other defence applications. So we are proposing this project for highly secure local area networks like Army, Navy and other defense application. Although there are more file formats are used, Microsoft products are most often used one. So we are proposing this concept on Microsoft products like word, Excel, and PowerPoint. Within that local area network, the creator and the reader of the document must be authenticated, using the highly secure authentication. Although they are using the secure authentication, there is no automatic generation of the digital signature, whenever they are creating any document. So we are proposing the automatic generation of the digital signature in the above products.Although there is an option for explicitly signing the documents, nobody is using that nowadays. So we must have the constraint that, everybody must sign their documents with their digital certificates while creating the document itself. So we are using the authentication for both the creator and the reader of the document so that no other can read the documents except the authenticated users. Although we have system login-based authentication, If the user leaves the system as it is after login, then anybody can use your system for making any malfunction. So we are proposing this “E-Token based two-factor authentication”. This will prompt the user to authenticate for two times. One is whenever they are using the system. Next whenever they are trying to create a new document.

Keywords:

Digital Signature, Integer Factorization Problem, Discrete Logarithm problem, Forgery, Etoken, PDSS

References:

[1] Shailendra Kumar Tripathi and Bhupendra Gupta, ―An Efficient Digital Signature Scheme by using Integer Factorization and Discrete Logarithm Problem‖ 978-1-5090-6367-3/17/$31.00 ©2017 IEEE 
[2] Rishikant Sagar, Akhilesh Pandey,"A System for Verification of Offline English Signature Using Soft Computing Approach",International Journal of Computer Science and Engineering (SSRG-IJCSE),Volume-2 Issue-9 2015. 
[3] Rakesh Shukla, Hari Om Prakash, R.PhaniBhushan, Signature with Two Factor Authentication‖ 978-1-5090-5769-6/16/$31.00 ©2016 IEEE 
[4] RakeshShukla, Hari Om Prakash, R.PhaniBhushan, Signature with Two Factor Authentication‖978-1-5090-5769-6/16/$31.00 ©2016 IEEE 
[5] Haritha Damarla,"Research Methodology on Offline and Online Signature Verification and Forgery Detection",International Journal of Computer Science and Engineering (SSRG-IJCSE), Volume-4 Issue-11 2017. 
[6] S.Goldwasser, S. Micali, and R. L. Rivest, ‖A digital signature scheme secure against adaptive chosen-message attacks,‖ SIAM Journal on Computing, vol.17,no.2,pp.281–308,198 
[7] Amit Kishore Shukla, Shreyas Singh,"Offline Signature Verification System using a Set of Simple Shape Based Geometric Features ",International Journal of Computer Trends and Technology (IJCTT),Volume-4 Issue-4 2013. 
[8] P. Kumar and B. P. Dungdung, ‖An extension of elgamaldigital signature algorithm,‖ Ph.D. dissertation, 2012. 
[9] J Sravanthi, Dr. MHM Krishna Prasad,"Robust and secure digital signature for image authentication over wireless Channels"International Journal of Computer Trends and Technology (IJCTT),Volume-1 Issue-3 2011. 
[10] D.Bleichenbacher,‖Generating eigamal signatures withoutknowing the secret key,‖ in Advances in Cryptology—EuroCrypt’96.Springer, pp. 10–18, 1996. 
[11] S.R.Subramaniya, B.K.Yi ,‖Digital Signatures‖ 10.1109/MP.2006.1649003 of 2008