Observations on the Theory of Digital Signatures and Cryptographic Hash Functions
Author
Abstract

As the demand for effective information protection grows, security has become the primary concern in protecting such data from attackers. Cryptography is one of the methods for safeguarding such information. It is a method of storing and distributing data in a specific format that can only be read and processed by the intended recipient. It offers a variety of security services like integrity, authentication, confidentiality and non-repudiation, Malicious. Confidentiality service is required for preventing disclosure of information to unauthorized parties. In this paper, there are no ideal hash functions that dwell in digital signature concepts is proved.

Year of Publication
2022
Conference Name
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT)
Google Scholar | BibTeX