Skip to main content

MDS3C: Modified Digital Signature Scheme for Secure Communication

  • Conference paper
  • First Online:
Proceeding of International Conference on Intelligent Communication, Control and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 479))

  • 2133 Accesses

Abstract

When it comes to security no one can be trusted, there may be situations, when sender’s and receiver’s authentication is required. Digital signature is used to provide the authentication to assure receiver about the message and its sender. Digital signature is an authentication mechanism which generates a unique code with the message, now this attached code (i.e., signature) is responsible for the validation of sender and message. As all know that digital signature provides authentication, message integrity, and non-repudiation services, but does not provide the confidentiality of data as well as signature which is most important during data transfer. This paper proposed a modified digital signature scheme for secure communication. This work includes the concept of public key encryption for secrecy of data. This work will reduce the well-known drawbacks of digital signature scheme. The aim of this technique is to provide the secure communication that includes the security for the data, private key, and digital signature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. National Institute of Standards and Technology, Digital Signature Standard (DSS), Federal Information Processing Standards 186–3.

    Google Scholar 

  2. William Stallings, Cryptography and Network Security Principles and Practices, 4th Edition, Pearson Education.

    Google Scholar 

  3. Kamal Kr. Gola, Bhumika Gupta and Zubair Iqbal, “Modified RSA Digital Signature Scheme for Data confidentiality”, International Journal of Computer Application, Volume-106, No. 13, November 2014.

    Google Scholar 

  4. R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Magazine communications of the ACM, Volume 21, Issue 2, Page 120–126, Feb 1978.

    Google Scholar 

  5. Thulasimani Lakshmanan and Madheswaran Muthusamy, “A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes”, the International Arab Journal of Information Technology, Vol. 9, No. 3, May 2012.

    Google Scholar 

  6. Aqeel Khalique, Kuldip Singh Sandeep Sood, Implementation of Elliptic Curve Digital Signature Algorithm, International Journal of Computer Applications, May 2010.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gulista Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Gulista Khan, Bhumika Gupta, Gola, K.K. (2017). MDS3C: Modified Digital Signature Scheme for Secure Communication. In: Singh, R., Choudhury, S. (eds) Proceeding of International Conference on Intelligent Communication, Control and Devices . Advances in Intelligent Systems and Computing, vol 479. Springer, Singapore. https://doi.org/10.1007/978-981-10-1708-7_36

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1708-7_36

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1707-0

  • Online ISBN: 978-981-10-1708-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics