Considers direct and arbitrated digital signatures as well as the concept of digital signatures ...... More...
2 Pages / 450 Words|
3 sources, 3 Citations,
More Papers on This Topic
Considers direct and arbitrated digital signatures as well as the concept of digital signatures in general. Also examines the characteristics of a suppress-relay attack. The critical role played by authentication protocols.
Digital Signatures Introduction Authentication protocols are a critical part of security in today\'sonline world and digital signatures are a significant part ofauthentication protocols There are industry-current techniques that focuson digital signatures and this research has as its objective consideringthe role and types of digital signatures in today\'s environment Properties of Digital Signatures A digital signature serves the same purpose as a handwrittensignature it verifies that the person whose signature is beingrepresented actually authorized the use of the signature and the signatureshould be
Text of the Paper:
The entire text of the paper is shown below. However, the text is somewhat scrambled. We want to give you as much information as we possibly can about our papers and essays, but we cannot give them away for free. In the text below you will find that while disordered, many of the phrases are essentially intact. From this text you will be able to get a solid sense of the writing style, the concepts addressed, and the sources used in the research paper.
ReferencesDavis, M. Retrieved from the Internet 27 Feb 2 6: .Mitchell, C. There are industry-current techniques that focuson digital signatures, and this research has as its objective consideringthe role and types of digital signatures in today's environment. This can behighly effective in the case of industrial espionage where messages can beexploited for competitive gain (Mitchell, 2 5). Properties of Digital Signatures A digital signature serves the same purpose as a handwrittensignature: it verifies that the person whose signature is beingrepresented actually authorized the use of the signature, and the signatureshould be verifiable so that disputes can be settled by third parties.Typically, it is also necessary to verify the date and time that thesignature was affixed to a document to ensure that the person in questioncould indeed have authorized the signature, whether handwritten or digital("Digital Signatures," 2 3). (2 3, November 28). Retrieved 27 Feb 2 6 from: . (n.d.). (2 5, 25 February). pdf>.Digital signatures and authentication protocols. With an arbitrated digitalsignature, a third party (the arbiter) uses a series of tests to verifythat the signature and the contents are valid, and the message is then senton to the recipient with a notice that it has been verified. Such attacks provide unauthorizedviewing of messages even when no other tampering takes place. The direct signature, as its nameimplies, involves only the sender and the receiver. Suppress-Replay Attack One of the other vulnerabilities of the arbitrated digital signatureis that of a suppress-replay attack. Encryption,including public key encryption, can be used with arbitrated signatures.The date and time stamp are used to ensure that the message is notintercepted in its routing, but this approach requires a high level ofconfidence in the arbiter since the messages are able to be read by thisthird-party (Davis, n.d.). In addition, the sender can denysending a particular message by suggesting that the private key was stolenand used to "forge" the digital signature (Davis, n.d.). The arbitrated digital signature developed as one defense against theweaknesses of the direct digital signature.
If this paper is not what you are looking for, you can search again:
We can write a Custom Essay just for you.