Abstract

: E-government, e-learning, e-shopping, and e-voting are examples of electronic processes whose efficacy depends on the security, legitimacy, and integrity of the data that is sent back and forth between users. Sensitive material must be extensively vetted by its intended recipient and digitally signed by its original sender in order to meet these benchmarks. Digital signature systems, which are based on intricate cryptographic formulas, are necessary to guarantee the dependability of these electronic services. However, a number of variables, like key and block sizes, computational complexity, security settings, and modifications unique to a given application, affect how well these services function. The goal of the present research was to identify the ideal level of security for electronic mechanisms through a thorough investigation of industry-standard digital signature systems by the authors. They also looked into possible uses in many fields to improve comprehension and application in real-world situations. Key Word: EDMS, Digital Signature, HD5 algorithm, SHA algorithm.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call