ISSN: 1813-0410

Keywords : Digital Signature

Create A New Digital Signature Scheme Using Double Hush Function Algorithms

Hameed Abdul-Kareem Younis; Israa Mahmood Hayder; Hussain A. Younis

journal of kerbala university, Volume 1, Issue 0, Pages 188-201

The rapid development of information and network technologies, networks already become an important part of peoples’ live. People not only can get more information by net, but also can find new ways to live and new business work. For example, network bank, online chat, net-shopping, … etc. Along with the new things' appearance, the problem of information security becomes more important. Something more than authentication is needed. The most attractive solution to this problem is the digital signature which is analogous to the handwritten signature.
Digital signature technology more and more shows its important position in information security. The signature is formed by taking the hash of the message and encrypting the message. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact, generated by the claimed signatory. In this paper, an algorithm for signing text file has been presented. The famous RSA public key algorithm and the most popular hash function algorithms (SHA-1 & MD5) are used to generate the digital signature of a text file. The algorithm consist of two parts: signature generation and signature verification. Many experiments tested to examine the security of the presented work.