Abstract

Modern information systems allow organizations to improve their efficiency, significantly reduce their costs and meet regulatory requirements. A good document management system is often regarded as all that is required, but additional protection measures are also needed to ensure that data is protected from unauthorized access and forgery. The purpose of this article is to modify the algorithms of cryptographic methods of protecting the integrity of a document using an electronic digital signature. Document management systems typically provide security and control access to documents in a controlled environment. However, when a document leaves a secure environment, it is easy to modify it. Unprotected documents do not allow to determine whether the document is authentic, who was the originator and the approver or has it been modified since its creation. The problem of keeping electronic documents from being copied, modified, and forgery requires specific approaches and methods of protection for its solution. One of the most common method of such protection in the world is an electronic digital signature (EDS), which confirms the authenticity, integrity its details and the fact of signing by a specific person of the document with the help of special software. Common encryption methods are based on factorization of large numbers (RSA, DSA, ElGamal) and discrete logarithmization (ECDSA, EdDSA, GOST R 34.10–2012). Each pair of keys consists of a private key and a public key. They are interdependent, but can be used separately. Usually, each pair of keys may belong to a specific key holder. The algorithm works in such a way that it is impossible for third parties to calculate the private key, even if they own the public key. Ref. 13, figure 6, table 3

Highlights

  • The Internet is an integral part of our everyday life, and a guarantee of a high level of security is one of the priorities in the development of information technology

  • If you use electronic digital signature to protect company data, you can modify Ed25519 with another hash function that will vulnerable to the same attacks as SHA-512

  • It is worth noting that electronic digital signatures have created a completely new level of convenience and secureness for companies all over the world that have dealt with legally binding contracts

Read more

Summary

Introduction

The Internet is an integral part of our everyday life, and a guarantee of a high level of security is one of the priorities in the development of information technology. The problem of keeping electronic documents from being copied, modified, and forgery requires specific approaches and methods of protection for its solution. One of the most common method of such protection in the world is an electronic digital signature (EDS), which confirms the authenticity, integrity its details and the fact of signing by a specific person of the document with the help of special software. Dependence on digital signatures alone is a matter of concern, since a pair of keys can be obtained by another person or organization using one method or another This can be resolved by verifying by certification center. The Electronic Signature Directive requires Member States [13] to ensure that service providers issuing certificates to the public do not collect personal data, except directly from the data subject, or without the explicit consent of the data subject. There is another requirement that only required data in case of necessity can be collected for the certificate maintenance and issuance

Open key
Memory fraction
OS Version System RAM The number of physical cores Clock frequency
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call