A digital signature algorithm in information and network security based on discrete logarithm and hash functions

被引:0
作者
Qu, Peixin [1 ]
Liu, Zhen [2 ]
机构
[1] School of Information and Engineering, Henan Institute of Science and Technology
[2] Network Information Center, Henan Institute of Science and Technology
关键词
Digital signatures; Hash function; Information security; Network security;
D O I
10.4156/jcit.vol7.issue20.65
中图分类号
学科分类号
摘要
The digital signature technology is an important technology for identification in a virtual environment for network systems. Digital signatures can be used to verify the document's authenticity, integrity and non-repudiation of information security research. The discrete logarithm problem is the large number of cryptographic protocols based on cryptography. Hash function is frequently used in the signature scheme, in order to improve the security and speed of the signature scheme. The hash is to find the mapping between data content and data storage address. The paper puts forward the Digital Signature Algorithm in information and network security based on discrete logarithm problem and Hash functions. The comparative analysis of the results shows that the discrete logarithm and Hash functions are higher efficiency than SHA+MD5.
引用
收藏
页码:557 / 564
页数:7
相关论文
共 50 条
  • [41] A Secure Digital Signature Algorithm Based on Elliptic Curve and Chaotic Mappings
    Peng Fei
    Qiu Shui-Sheng
    Long Min
    Circuits, Systems and Signal Processing, 2005, 24 : 585 - 597
  • [42] SPT: Security Policy Translator for Network Security Functions in Cloud-Based Security Services
    Lingga, Patrick
    Jeong, Jaehoon
    Yang, Jinhyuk
    Kim, Jeonghyeon
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5156 - 5169
  • [43] Study on the application of digital certificates in the protection of network information security and data integrity
    Li, H. (493885444@qq.com), 1600, Academy Publisher, P.O.Box 40,, OULU, 90571, Finland (08): : 2592 - 2598
  • [44] Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations
    Fathalla, Efat
    Azab, Mohamed
    IEEE ACCESS, 2024, 12 : 175969 - 175987
  • [45] CONSTRUCTION METHOD OF INFORMATION SECURITY DETECTION BASED ON CLUSTERING ALGORITHM
    Chen, Shaobo
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (06): : 5295 - 5301
  • [46] A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things
    Mughal, Muhammad Arif
    Luo, Xiong
    Ullah, Ata
    Ullah, Subhan
    Mahmood, Zahid
    IEEE ACCESS, 2018, 6 : 31630 - 31643
  • [47] Information security of hospital computer network based on SAE deep neural network
    Li G.
    Dong Z.
    Wang Y.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [48] Network Information Security Model Based on Web Data Mining
    Lingam, M. Shankar
    Kumar, A. Arun
    Sudhakara, A. M.
    INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND APPLICATIONS, ICICA 2016, 2018, 632 : 51 - 56
  • [49] Network Security Analysis and Design of Medical Information System Based on
    Chang, M. J.
    Jia, X.
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 502 - 506
  • [50] The elementary introduction of network security based on logistics information platform
    Yang Dan
    Geng di
    PROCEEDINGS OF THE 2006 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2006, : 716 - 720