Digital Signature and Hash Function Irregularity

Tuba M.

8th WSEAS International Conference on Telecommunications and Informatics, İstanbul, Turkey, 30 May - 01 June 2009, pp.169-170 identifier

  • Publication Type: Conference Paper / Full Text
  • City: İstanbul
  • Country: Turkey
  • Page Numbers: pp.169-170
  • Istanbul Technical University Affiliated: No


Use of computer networks is expanding in many important areas such as e-government, c-business, e-learning etc. In any Such communications network it is crucial to be able to authenticate both the contents and the origin of a message. Digital signatures (based on public key schemas) are used for authentication and I ideally, I they Should provide the same guarantees as I handwritten signatures unforgeability (only the author of a message should be able to sign his name to a message), undentability (the author of a message Should not be able to deny lie signed it at a later stage) and authentication (the signature should allow the contents of the message to be authenticated)