Work place: Department of Computer Science & Engineering, Oriental University, Indore, (M.P), India
E-mail: 2006.bhandari@gmail.com
Website:
Research Interests: Applied computer science, Computational Science and Engineering, Computational Engineering, Computer systems and computational processes, Theoretical Computer Science, Engineering
Biography
Prof. Rajat Bhandari is a high skilled corporate of more than 4 years experience in the industry. Due to his research interest currently he is working as a professor in department of computer science & engineering in Oriental University, Indore. He had also devoted his work as a supervisor for various projects regarding security solutions. He had done his master in computer science & currently pursuing his PHD from a well recognized university. During his motivating work in research are he had published various papers in peer reviewed international journals.
By Reenu Shukla Rajat Bhandari
DOI: https://doi.org/10.5815/ijmecs.2013.09.03, Pub. Date: 8 Sep. 2013
Providing the security on the basis of encryption standards is considered as key challenges for achieving the integrity & confidentiality. There are three main public-key cryptosystem contenders. Each has a variable key size that can be increased to achieve higher security at the cost of slower cryptographic operations. The best attack known on each public-key cryptosystem requires an amount of computation determined by a security parameter which is related to the key size. The secondary factor is confidentiality i.e. ensuring that adversaries gain no intelligence from a transmitted message. There are two major techniques for achieving confidentiality:
This work proposes a novel prototype ECDSA which provides the security where there is not complete trust between documents’ sender and receiver & something more than authentication is needed. The signature is formed by taking the hash of the message and encrypting the message with the creator’s private key. It guarantees the source and integrity of the message. Then a suitable digital signature algorithm will be picked out as a result of comparing and analyzing three main digital signature algorithms in this paper. Finally, a scheme of digital signature in electronic government will be proposed in order to settle some specific problems such as spilling out the secret, forging or denial and so on. Besides, a brief analysis regarding security will be given for this scheme.
Subscribe to receive issue release notifications and newsletters from MECS Press journals