SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 5 (Mar. - Apr. 2013), PP 26-31
www.iosrjournals.org
www.iosrjournals.org 26 | Page
Achieving data integrity by forming the digital signature using
RSA and SHA-1 algorithm
Isha Shingari, Sourabh Singh Verma
M.Tech Computer Science Engineering, Dept. of Computer Science Engineering Mody Institute Of Technology
and Science
Abstract: Technology has been touching our lives in almost every domain. With the advent of modern
technologies, the need of enhancing its security also arises. Data security has become one of the most important
issues of concern. Data security is achieved with the help of adapting certain security measures. Here, in this
paper we have analyzed the various cryptographic concepts. Encryption and decryption are two most important
aspects of cryptography and data security. The special light has been thrown on data integrity and protection
issues. The RSA algorithm has been explained. The implementation of the algorithm has also been given with
the help of proving a graphical interface. The data integrity has been established at the client and receiver end
by not limiting it to a standalone application.
Keywords: cryptography, data security, information security, data integrity, RSA, SHA-1, client/server
I. Introduction
The concept of network security and cryptography is not new. It has been touching many areas which
include the strong data encryption techniques, trusted third party access and a secure communication channel.
While talking about data security, it can be considered as the main aspect of the secure data transmission over an
unreliable network. Data security has become one of the major challenging issues which need a great deal of
attention. The information could be accessed for malicious reasons. Therefore it has become very crucial to
come up with the suitable security measures for making the data security stronger[1].
The meaning of information security suggests the protection of information systems from the unauthorized use,
disclosure, modification, perusal, recording, destruction or access. This area is often related with the protection
of integrity, availability and confidentiality of information.
The key concepts associated with information security are integrity, confidentiality, availability,
authenticity and non-repudiation. The term integrity suggests that the data cannot be modified undetectably. It
can be considered as the special case of ACID transaction processing. Confidentiality is the term which is used
to denote the disclosure of information to unauthorized individuals or the systems. The credit card transactions
on the internet preserve the confidentiality and thus maintain the privacy of the people.
Availability means that the information should always be available when it is needed. The computing systems
which are used to store and process the information, the security controls use to protect it and communicate
channels used to access it, must function in the correct manner. It thereby ensures the protection of information
from the Denial Of Services attack.
The authenticity of information means that the data, transactions, communications and documents used
should be genuine. There is a validation of both the parties and it is checked whether they are same which they
claim to be. The non-repudiation means that the two information exchanging parties cannot deny their retrieval
and transmission of information. It means that the one party cannot deny the fact of receiving the information
nor the other party can deny having sent the information.
II. Data Integrity
The term data integrity suggests the security against the unauthorized modification of messages. The
data integrity is very close to the classical subjects in communication which is the error detection code. The
latter one is the procedure for the detection of errors which can be introduced in the messages due to the fault
generated in the communications. It is often considered that by the usage of the information which has been
modified maliciously, stands at the same risk as using the information which contains the defects due to the
errors introduced in data processing or communications[2].
The asymmetric and symmetric ciphers play a remarkable role to establish the user authentication and
confidentiality, but it cannot guarantee the data integrity. There must be alternate measures for ensuring the data
integrity which can be possible through the added layer of security. Message digests generally posses the
following characteristics:
 A variable length input is taken which is used then to generate the fixed length output which is known as
the hash or a message digest.
Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm
www.iosrjournals.org 27 | Page
 It is not computationally feasible for calculating the message which is based on the digest.
 It is also infeasible to find out the two messages which will generate the same digest, this feature is known
as collision resistance.
 Thereby, the message digests or hashes achieve the data integrity by applying of the complex math to the
data for ensuring that this data has not been tampered on its route towards the final destination.
 Data integrity is needed only in the situations where the value of data being transferred is high enough to
warrant the added layer of security versus the risks involved in exposing the digital data.
III. Cryptography
The word “cryptography” has its Greek origin and it is literally translated as the “secret writing”. When
the digital communications were not invented, the cryptographic methods were the only way used by military
people for espionage. With the advent of modern technologies in communication, the individuals and businesses
can transport information at a very marginal price with the help of public networks like Internet. This makes the
data to be exposed over the medium. Therefore it is very important for the businesses to make sure that the
sensitive date is transferred from one point to another in a secure manner.
Cryptography is the mechanism which helps in achieving the security by making the data
incomprehensible to everyone except the projected receiver. The term encryption involves the conversion of the
plaintext into the cipher text. The plaintext is the readable data and the cipher text is a data which is impossible
to read without the key. The key acts as the medium to convert the plain text into cipher text and vice versa. The
process of conversion of cipher text into the plain text is called decryption. The key for encryption and
decryption is meant to be secret and the strength of key decides the privacy of cipher text.
Figure 1: encryption and decryption
Types of Cryptography
There are two kinds of cryptographic algorithms: Public Key Cryptography and Secret Key Cryptography
a. Public Key Cryptography
This kind of cryptographic system uses two keys. One key is used for encryption and another key is used for the
decryption. This is also known as the asymmetric cryptography.
 Every user owns two keys- one public key which is known to all the users and one is key is private key
which is kept secret. The private and public key are mathematically linked.
 The encryption is performed using the public key and the process of decryption is undertaken with the
help of private key.
 The examples are RSA and ECC(Elliptic Key Cryptography)
 It supports non-repudiation and considered very secure.
b. Secret Key Cryptography
 This kind of cryptographic system uses the same key for encryption as well as decryption. This is
known as symmetric cryptography.
 The sender and receiver should have the same key for communicating successfully.
 The examples are DES, 3-DES, RC4, RC5
Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm
www.iosrjournals.org 28 | Page
 It is widely used and very popular and the generated key is very strong.
 The non-repudiation cannot be achieved, and the generated key is subject to be intercepted by the
hackers.
IV. The RSA algorithm
The RSA algorithm is for the public key cryptography which is based on the factoring of large integers.
The algorithm is named after its invertors Ron Rivest, Adi Shamir and Len Adleman, who invented it in the year
1977. The RSA algorithm is known to be most widely used public key cryptography based algorithm around the
world. The RSA algorithm can be used for both public key encryption as well as digital signatures. The security
of this algorithm is based on its difficulty to factorize the large integers.
Through the RSA cryptosystem, the sender can send the encrypted message to the receiver without any kind of
previous exchange of secret keys. Sender uses the receiver’s public key for encrypting the text and the receiver
uses its public key for decryption. RSA can also be used to sign a message, so A can sign a message using their
private key and B can verify it using A's public key[3].
3.1 Operations in RSA algorithm
The RSA algorithm involves a three step procedure which includes the key generation, encryption and
decryption.
3.1.1.Key generation
The RSA algorithm starts with the generation of key pair which includes the public key and a private key. The
public key is known to all the users and it is used for encryption. The decryption is achieved by private key.
The keys for the algorithm are generated by following the given procedure:
1. Select the two distinct prime numbers say p and q.
 Keeping in mind the security reasons, the integers p and q should be selected randomly and should be
of the similar bit length. The prime numbers could be identified conducting the primality test.
2. Compute the value of the modulus say n. n= p*q.
 The value of n is used for both private and public keys and is called as the modulus.
3. The next step is to calculate the value of Euler’s totient function. This function is denoted as :
∅ 𝑛 = 𝑝 − 1 (𝑞 − 1)………………(1)
4. The next is to choose an integer(let us name it e)such that the value of e should lie between 1 and Ø(n).
One more thing which is to be kept in mind is that the value of gcd(e, Ø(n)) should be 1. It means that
the number e and Ø(n) are coprime.
 “e” is the public key exponent
 The most common value of e is 65,537. The smaller values of e like 5 are supposed to be less secure in
certain settings. [4]
5. Then the value of d is calculated. 𝑑 ≡ 𝑒 1 𝑚𝑜𝑑 Ø 𝑛 ………………….(2)
 d is known as the multiplicative inverse of e modØ(n).
 The above equation (2) is more clearly stated as
(de) = 1 mod Ø(n)……………..(3)
 This is calculated as the Extended Euclidean algorithm .
 “d” is the private key component.
By the (3) equation, the public key consists of the modulus(n) and the public key exponent(e). The
private key consists of two parameters one is the modulus(n) and other is exponent (d) which must be
kept secret. The values of p, q, and Ø(n) should be kept secret. These three values are used for
calculating the value of d.
3.1.2Encryption
The sender sends its public key( n,e) to the receiver. The private key is kept secret. Then the receiver sends the
message M to the sender. The message is converted into an integer where its value lies between 0 and n. This is
done by the padding scheme. Then the cipher text is calculated. С=m ͤ(mod n)……………………….(4)
3.1.3Decryption
The sender can recover the message (m) from the cipher text ( c ) by using the private key component (d) by
using the equation:
m = c ^d (mod n)………………………(5)
Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm
www.iosrjournals.org 29 | Page
Figure 2: encryption and decryption in RSA
IV. Implementation
We perform to obtain data integrity through digital signature. In this project, the digital signature is
obtained in two stages.
The two stages are:
1. Encryption by RSA algorithm
2. Creating message digest by SHA-1 algorithm
In our approach, we have implemented RSA using the Java platform. In this case we have not fixed up any kind
of intervals for the selection of prime numbers. We are generating the prime numbers randomly. The prime
numbers are generated and they are generating the public key and the private key components. These public key
and private key have been used for encrypting the text message by the user. The encrypted message is saved in
the database along with the original message. A graphical interface has been provided to enhance the
understanding. We name the project as data integrity.
We wish to calculate the RSA encrypted message by generating the private and public key. We have also
generated the message digest by using the SHA-1 algorithm. Here, we wish to achieve the data integrity by
1. Encrypting the user input text
2. Forming the message digest.
3. We have made a sender window.
Figure 3. A snapshot of implementation of RSA algorithm in Java.
We have made the receiver end also. In the receiver end:
1. The message is decrypted using the RSA algorithm.
2. The message digest of the decrypted text is calculated using the SHA-1 algorithm.
3. If the message digest match at the sender and receiver end then the data integrity is achieved else it is
not achieved.
Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm
www.iosrjournals.org 30 | Page
Figure:4 Snapshot of receiver end
The complete procedure can be completed in the format of sender and receiver side on one computer. This
procedure is implemented in the client and server environment on different computers as well. To better
understand it, the flowchart of the system is given.
Figure 5: flowchart of the system
The application is run on the client end and the server end. The message from the client end is passed onto the
server. This way the data integrity is achieved.
Figure 6: application layout of the system
Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm
www.iosrjournals.org 31 | Page
V. Conclusion
The encrypted text has been successfully generated using the RSA algorithm. We have made one
sender end. In this, the private key and the public key have been generated. The message digest is formed at the
sender end and receiver end using the SHA-1 algorithm. The graphical interface enhances the understanding and
achieves faster results.
VI. Future Scope
The above approach uses the RSA and SHA-1 algorithm. It can be further used in VANET kind of a
scalable environment.
References
[1] http://en.wikipedia.org/wiki/Information_security
[2] modern cryptography theory and practice , chapter 10, 10.1 section
[3] Introduction to Cryptography By Mohan Atreya (matreya@rsasecurity.com)
[4] Boneh, Dan (1999). "Twenty Years of attacks on the RSA Cryptosystem". Notices of the American Mathematical Society 46 (2):
203–213.

More Related Content

What's hot

Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safeeSAT Publishing House
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...eSAT Journals
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismConference Papers
 
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd Iaetsd
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemEditor IJMTER
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
A novel paradigm in authentication system
A novel paradigm in authentication systemA novel paradigm in authentication system
A novel paradigm in authentication systemIJNSA Journal
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric keyRajat Tripathi
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 

What's hot (18)

Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safe
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
 
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
A novel paradigm in authentication system
A novel paradigm in authentication systemA novel paradigm in authentication system
A novel paradigm in authentication system
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 

Viewers also liked

Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...IOSR Journals
 
Voltage Enhancement in Distribution System using Voltage Improvement Factor
Voltage Enhancement in Distribution System using Voltage Improvement FactorVoltage Enhancement in Distribution System using Voltage Improvement Factor
Voltage Enhancement in Distribution System using Voltage Improvement FactorIOSR Journals
 
Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsIOSR Journals
 
An Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its ApplicationsAn Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its ApplicationsIOSR Journals
 
и.а.крылов викторина
и.а.крылов  викторинаи.а.крылов  викторина
и.а.крылов викторинаNatalya Dyrda
 
Hit and fill
Hit and fillHit and fill
Hit and fillmharish9
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyIOSR Journals
 
Body in mind
Body in mindBody in mind
Body in mindAlebmj
 
Scalability Enhancement of Push/Pull Server functions by converting Stateless...
Scalability Enhancement of Push/Pull Server functions by converting Stateless...Scalability Enhancement of Push/Pull Server functions by converting Stateless...
Scalability Enhancement of Push/Pull Server functions by converting Stateless...IOSR Journals
 
Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3IOSR Journals
 
Analysis of Pseudogap in Superconductors
Analysis of Pseudogap in SuperconductorsAnalysis of Pseudogap in Superconductors
Analysis of Pseudogap in SuperconductorsIOSR Journals
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Re:Thinking Audience Engagement with an online exhibit
Re:Thinking Audience Engagement with an online exhibitRe:Thinking Audience Engagement with an online exhibit
Re:Thinking Audience Engagement with an online exhibitJustine G. Chapleau
 
An effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parserAn effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parserIOSR Journals
 

Viewers also liked (20)

Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...Automatic generation control of two area interconnected power system using pa...
Automatic generation control of two area interconnected power system using pa...
 
G0933443
G0933443G0933443
G0933443
 
Voltage Enhancement in Distribution System using Voltage Improvement Factor
Voltage Enhancement in Distribution System using Voltage Improvement FactorVoltage Enhancement in Distribution System using Voltage Improvement Factor
Voltage Enhancement in Distribution System using Voltage Improvement Factor
 
L01246974
L01246974L01246974
L01246974
 
Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixels
 
An Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its ApplicationsAn Overview of TRIZ Problem-Solving Methodology and its Applications
An Overview of TRIZ Problem-Solving Methodology and its Applications
 
и.а.крылов викторина
и.а.крылов  викторинаи.а.крылов  викторина
и.а.крылов викторина
 
Manual completo
Manual completoManual completo
Manual completo
 
Hit and fill
Hit and fillHit and fill
Hit and fill
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
Body in mind
Body in mindBody in mind
Body in mind
 
Decadence Strategy
Decadence StrategyDecadence Strategy
Decadence Strategy
 
Scalability Enhancement of Push/Pull Server functions by converting Stateless...
Scalability Enhancement of Push/Pull Server functions by converting Stateless...Scalability Enhancement of Push/Pull Server functions by converting Stateless...
Scalability Enhancement of Push/Pull Server functions by converting Stateless...
 
Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3Electronic and Vibrational Properties of Pbsns3
Electronic and Vibrational Properties of Pbsns3
 
Cynthia yeo cv2 nov
Cynthia yeo cv2 novCynthia yeo cv2 nov
Cynthia yeo cv2 nov
 
C01461422
C01461422C01461422
C01461422
 
Analysis of Pseudogap in Superconductors
Analysis of Pseudogap in SuperconductorsAnalysis of Pseudogap in Superconductors
Analysis of Pseudogap in Superconductors
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Re:Thinking Audience Engagement with an online exhibit
Re:Thinking Audience Engagement with an online exhibitRe:Thinking Audience Engagement with an online exhibit
Re:Thinking Audience Engagement with an online exhibit
 
An effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parserAn effective citation metadata extraction process based on BibPro parser
An effective citation metadata extraction process based on BibPro parser
 

Similar to Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm

Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSIJNSA Journal
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityShitiz Upreti
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxGarimaJain745610
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534IJRAT
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptxRiddhiGupta84
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 

Similar to Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm (20)

Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
N45028390
N45028390N45028390
N45028390
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 

Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 5 (Mar. - Apr. 2013), PP 26-31 www.iosrjournals.org www.iosrjournals.org 26 | Page Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm Isha Shingari, Sourabh Singh Verma M.Tech Computer Science Engineering, Dept. of Computer Science Engineering Mody Institute Of Technology and Science Abstract: Technology has been touching our lives in almost every domain. With the advent of modern technologies, the need of enhancing its security also arises. Data security has become one of the most important issues of concern. Data security is achieved with the help of adapting certain security measures. Here, in this paper we have analyzed the various cryptographic concepts. Encryption and decryption are two most important aspects of cryptography and data security. The special light has been thrown on data integrity and protection issues. The RSA algorithm has been explained. The implementation of the algorithm has also been given with the help of proving a graphical interface. The data integrity has been established at the client and receiver end by not limiting it to a standalone application. Keywords: cryptography, data security, information security, data integrity, RSA, SHA-1, client/server I. Introduction The concept of network security and cryptography is not new. It has been touching many areas which include the strong data encryption techniques, trusted third party access and a secure communication channel. While talking about data security, it can be considered as the main aspect of the secure data transmission over an unreliable network. Data security has become one of the major challenging issues which need a great deal of attention. The information could be accessed for malicious reasons. Therefore it has become very crucial to come up with the suitable security measures for making the data security stronger[1]. The meaning of information security suggests the protection of information systems from the unauthorized use, disclosure, modification, perusal, recording, destruction or access. This area is often related with the protection of integrity, availability and confidentiality of information. The key concepts associated with information security are integrity, confidentiality, availability, authenticity and non-repudiation. The term integrity suggests that the data cannot be modified undetectably. It can be considered as the special case of ACID transaction processing. Confidentiality is the term which is used to denote the disclosure of information to unauthorized individuals or the systems. The credit card transactions on the internet preserve the confidentiality and thus maintain the privacy of the people. Availability means that the information should always be available when it is needed. The computing systems which are used to store and process the information, the security controls use to protect it and communicate channels used to access it, must function in the correct manner. It thereby ensures the protection of information from the Denial Of Services attack. The authenticity of information means that the data, transactions, communications and documents used should be genuine. There is a validation of both the parties and it is checked whether they are same which they claim to be. The non-repudiation means that the two information exchanging parties cannot deny their retrieval and transmission of information. It means that the one party cannot deny the fact of receiving the information nor the other party can deny having sent the information. II. Data Integrity The term data integrity suggests the security against the unauthorized modification of messages. The data integrity is very close to the classical subjects in communication which is the error detection code. The latter one is the procedure for the detection of errors which can be introduced in the messages due to the fault generated in the communications. It is often considered that by the usage of the information which has been modified maliciously, stands at the same risk as using the information which contains the defects due to the errors introduced in data processing or communications[2]. The asymmetric and symmetric ciphers play a remarkable role to establish the user authentication and confidentiality, but it cannot guarantee the data integrity. There must be alternate measures for ensuring the data integrity which can be possible through the added layer of security. Message digests generally posses the following characteristics:  A variable length input is taken which is used then to generate the fixed length output which is known as the hash or a message digest.
  • 2. Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm www.iosrjournals.org 27 | Page  It is not computationally feasible for calculating the message which is based on the digest.  It is also infeasible to find out the two messages which will generate the same digest, this feature is known as collision resistance.  Thereby, the message digests or hashes achieve the data integrity by applying of the complex math to the data for ensuring that this data has not been tampered on its route towards the final destination.  Data integrity is needed only in the situations where the value of data being transferred is high enough to warrant the added layer of security versus the risks involved in exposing the digital data. III. Cryptography The word “cryptography” has its Greek origin and it is literally translated as the “secret writing”. When the digital communications were not invented, the cryptographic methods were the only way used by military people for espionage. With the advent of modern technologies in communication, the individuals and businesses can transport information at a very marginal price with the help of public networks like Internet. This makes the data to be exposed over the medium. Therefore it is very important for the businesses to make sure that the sensitive date is transferred from one point to another in a secure manner. Cryptography is the mechanism which helps in achieving the security by making the data incomprehensible to everyone except the projected receiver. The term encryption involves the conversion of the plaintext into the cipher text. The plaintext is the readable data and the cipher text is a data which is impossible to read without the key. The key acts as the medium to convert the plain text into cipher text and vice versa. The process of conversion of cipher text into the plain text is called decryption. The key for encryption and decryption is meant to be secret and the strength of key decides the privacy of cipher text. Figure 1: encryption and decryption Types of Cryptography There are two kinds of cryptographic algorithms: Public Key Cryptography and Secret Key Cryptography a. Public Key Cryptography This kind of cryptographic system uses two keys. One key is used for encryption and another key is used for the decryption. This is also known as the asymmetric cryptography.  Every user owns two keys- one public key which is known to all the users and one is key is private key which is kept secret. The private and public key are mathematically linked.  The encryption is performed using the public key and the process of decryption is undertaken with the help of private key.  The examples are RSA and ECC(Elliptic Key Cryptography)  It supports non-repudiation and considered very secure. b. Secret Key Cryptography  This kind of cryptographic system uses the same key for encryption as well as decryption. This is known as symmetric cryptography.  The sender and receiver should have the same key for communicating successfully.  The examples are DES, 3-DES, RC4, RC5
  • 3. Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm www.iosrjournals.org 28 | Page  It is widely used and very popular and the generated key is very strong.  The non-repudiation cannot be achieved, and the generated key is subject to be intercepted by the hackers. IV. The RSA algorithm The RSA algorithm is for the public key cryptography which is based on the factoring of large integers. The algorithm is named after its invertors Ron Rivest, Adi Shamir and Len Adleman, who invented it in the year 1977. The RSA algorithm is known to be most widely used public key cryptography based algorithm around the world. The RSA algorithm can be used for both public key encryption as well as digital signatures. The security of this algorithm is based on its difficulty to factorize the large integers. Through the RSA cryptosystem, the sender can send the encrypted message to the receiver without any kind of previous exchange of secret keys. Sender uses the receiver’s public key for encrypting the text and the receiver uses its public key for decryption. RSA can also be used to sign a message, so A can sign a message using their private key and B can verify it using A's public key[3]. 3.1 Operations in RSA algorithm The RSA algorithm involves a three step procedure which includes the key generation, encryption and decryption. 3.1.1.Key generation The RSA algorithm starts with the generation of key pair which includes the public key and a private key. The public key is known to all the users and it is used for encryption. The decryption is achieved by private key. The keys for the algorithm are generated by following the given procedure: 1. Select the two distinct prime numbers say p and q.  Keeping in mind the security reasons, the integers p and q should be selected randomly and should be of the similar bit length. The prime numbers could be identified conducting the primality test. 2. Compute the value of the modulus say n. n= p*q.  The value of n is used for both private and public keys and is called as the modulus. 3. The next step is to calculate the value of Euler’s totient function. This function is denoted as : ∅ 𝑛 = 𝑝 − 1 (𝑞 − 1)………………(1) 4. The next is to choose an integer(let us name it e)such that the value of e should lie between 1 and Ø(n). One more thing which is to be kept in mind is that the value of gcd(e, Ø(n)) should be 1. It means that the number e and Ø(n) are coprime.  “e” is the public key exponent  The most common value of e is 65,537. The smaller values of e like 5 are supposed to be less secure in certain settings. [4] 5. Then the value of d is calculated. 𝑑 ≡ 𝑒 1 𝑚𝑜𝑑 Ø 𝑛 ………………….(2)  d is known as the multiplicative inverse of e modØ(n).  The above equation (2) is more clearly stated as (de) = 1 mod Ø(n)……………..(3)  This is calculated as the Extended Euclidean algorithm .  “d” is the private key component. By the (3) equation, the public key consists of the modulus(n) and the public key exponent(e). The private key consists of two parameters one is the modulus(n) and other is exponent (d) which must be kept secret. The values of p, q, and Ø(n) should be kept secret. These three values are used for calculating the value of d. 3.1.2Encryption The sender sends its public key( n,e) to the receiver. The private key is kept secret. Then the receiver sends the message M to the sender. The message is converted into an integer where its value lies between 0 and n. This is done by the padding scheme. Then the cipher text is calculated. С=m ͤ(mod n)……………………….(4) 3.1.3Decryption The sender can recover the message (m) from the cipher text ( c ) by using the private key component (d) by using the equation: m = c ^d (mod n)………………………(5)
  • 4. Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm www.iosrjournals.org 29 | Page Figure 2: encryption and decryption in RSA IV. Implementation We perform to obtain data integrity through digital signature. In this project, the digital signature is obtained in two stages. The two stages are: 1. Encryption by RSA algorithm 2. Creating message digest by SHA-1 algorithm In our approach, we have implemented RSA using the Java platform. In this case we have not fixed up any kind of intervals for the selection of prime numbers. We are generating the prime numbers randomly. The prime numbers are generated and they are generating the public key and the private key components. These public key and private key have been used for encrypting the text message by the user. The encrypted message is saved in the database along with the original message. A graphical interface has been provided to enhance the understanding. We name the project as data integrity. We wish to calculate the RSA encrypted message by generating the private and public key. We have also generated the message digest by using the SHA-1 algorithm. Here, we wish to achieve the data integrity by 1. Encrypting the user input text 2. Forming the message digest. 3. We have made a sender window. Figure 3. A snapshot of implementation of RSA algorithm in Java. We have made the receiver end also. In the receiver end: 1. The message is decrypted using the RSA algorithm. 2. The message digest of the decrypted text is calculated using the SHA-1 algorithm. 3. If the message digest match at the sender and receiver end then the data integrity is achieved else it is not achieved.
  • 5. Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm www.iosrjournals.org 30 | Page Figure:4 Snapshot of receiver end The complete procedure can be completed in the format of sender and receiver side on one computer. This procedure is implemented in the client and server environment on different computers as well. To better understand it, the flowchart of the system is given. Figure 5: flowchart of the system The application is run on the client end and the server end. The message from the client end is passed onto the server. This way the data integrity is achieved. Figure 6: application layout of the system
  • 6. Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm www.iosrjournals.org 31 | Page V. Conclusion The encrypted text has been successfully generated using the RSA algorithm. We have made one sender end. In this, the private key and the public key have been generated. The message digest is formed at the sender end and receiver end using the SHA-1 algorithm. The graphical interface enhances the understanding and achieves faster results. VI. Future Scope The above approach uses the RSA and SHA-1 algorithm. It can be further used in VANET kind of a scalable environment. References [1] http://en.wikipedia.org/wiki/Information_security [2] modern cryptography theory and practice , chapter 10, 10.1 section [3] Introduction to Cryptography By Mohan Atreya (matreya@rsasecurity.com) [4] Boneh, Dan (1999). "Twenty Years of attacks on the RSA Cryptosystem". Notices of the American Mathematical Society 46 (2): 203–213.