This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Nature

DIGITAL SIGNATURE

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

DIGITAL SIGNATURE

Introduction

Digital signatures involve the validation and the authentication in the application of information, software and other digital messages. The practice has been adopted by the present era to ensure the sender’s identity, the news and the receiver of the data. With technology advancement today, the identification of the senders of information has become a challenge to many organizations. Therefore, digital signatures provide the surety of originality and identity of the electronic content. Besides, the incorporation of the Public Key Infrastructure (PKI) has enhanced the performance of the digital signatures in the global markets. Consequently, the establishment of digital signatures in public relations has improved the safety of some information and online documents.  This paper provides a detailed and technical explanation of digital signatures and their implementation and distribution of Public Key Infrastructure (PKI).

Don't use plagiarised sources.Get your custom essay just from $11/page

Literature Review

According to Poona & Yama (2018, pg. 45), digital signature forms a mathematics method utilized in the validation of authenticity and integrity of any information, software and digital forms. The digital equivalent of the present security is intended to resolve the challenge of interfering and personification in the digital transfer of data.   Digital signatures often assure the original evidence, identity and status of either electronic document, financial transactions. Fiege, Groover, & Hack, (2018, pg. 12) states that many nations such as the United States have incorporated the use of digital signatures in the governmental program as legal binds similar to the traditional names.

Poona & Yama (2018, pg. 47) connects the use of the digital signatures in the critical public infrastructure (PKI) which is evidenced in the distribution, revocations and the verifying of the public keys used in the encryptions and linking of identities and certifications. PKI helps the users and programs to firmly exchange information via the internet and verify the legitimacy of some certification’s like the websites, emails, servers (Rezaeighaleh, Laurens & Zou, 2018, pg. 182). Additionally, the PKI is principally used in the authentication of the digital certificates’ holders.  As a result, the documents can either authenticate or revoke the letters by the use of cryptographic algorithms to secure the process.

Zeilenga (2018, pg. 102) depicts that the use of digital signature has been used to control the communication process through the online process. This forms the authentic users and receivers of the data transfer by identification of the information about the certificate holders and additional information about the creation process, the date of issue and validity of the period. He mentions that the global world has been connected by the use of the internet and less use of paperwork. Many connections in the world have enhanced the retrieval of information through the websites. The information on these sites has promoted access to opportunities in the job market. However, the use of digital signatures, according to Zeilanga, has helped to reduce the cases of unauthorized persons accessing information or even goodies. As a result, the world has enhanced verification of documents and information both analogue and digitally.  He fails to mention the challenges that have been caused by the introduction of these digital advancements.

Lozupone (2018, pg. 56) examines the performance of the digital signature in the present world.  He insists that digital signatures have been founded upon public-key cryptographies, which is also called asymmetric cryptography. With a community key procedure like RSA, an individual might make two keys linked mathematically, including public and private ones. Digital signatures are applicable since community key cryptographies depend on two equally validating cryptographic recipes. The people that create the digital signatures utilize their private keys to encode signature-connected data; the simple method of decrypting such kinds of facts is by the public key of the signer (Rezaeighaleh, Laurens & Zou, 2018, pg. 182). This indicates how the digital signature works in the world today.  Digital signature knowledge entails all the participants to hope that the person making the signatures would be incapacity to store their private keys secretly. If somebody different has contact to the private key of the signer, that participant is likely to make fake digital signatures having the information of the holder‘s private key.

Focus on a specific type
PKI certificates

Other than the people’s public keys, the digital document contains gen about the procedure used to generate the signatures, the individual or entity recognized the digital names of a CA that proved the business facts and supplied the certificates. As well, the tenacity of public vital encryptions, signatures and permit signings on line, especially over the emails. This interaction is realized over the emails to validate the online certificates.  The practice is done through the identification of some signatories to the online-uploaded declarations. While PKI credentials are utilized in the applying cryptographies over emails, websites and other internet networks.

This knowledge can be used in the fight against crimes and other efforts of accessing unauthorized data.  The method involves identifying the signatories to the online documents by ensuring the rightful ownership and access to such data.
Research Methodology
            The research on the digital signature used both qualitative and quantitative research methods, in which both secondary and primary data were used in gathering information. The process entailed the use of experiments on the application of digital signatures and the critical public infrastructure on emails and other websites. Additionally, the research conducted interviews on a hundred individuals online who have subscribed to some online channels. These sample population provided information concerning their experience of the digital signature. The researchers also observed user of some websites and emails and recorded some information concerning digital signatures. However, some secondary data was applied in the literature review section. These sources helped in the identification of facts concerning the current and future status of digital signatures.

Ethical Issues
            The project applied all the legal considerations for the performance of the research. The project had validation of the license in the access to personal information like emails and other online documents. The identities of the respondent remain confidential by using unanimous identifications.

Project Management
the project used the following diagram in the research process.

 

F1 communication system

 

 

 

 

 

 

 

 

 

 

 

 

F2. Email signatures

Project Evaluation
the success of the project was based on the respondent to the research questions. However, the sampling methods adopted enhanced the provision of data that facilitated the acquisition of information on digital signature and critical public infrastructures.
Conclusion

It is evident from Bannore & Devane, (2016, pg. 86) that digital signature and implementation and distribution concerning Public Key Infrastructure (PKI). They mention that with a person’s or public key, the digital credentials contain info about the procedure used to generate the autograph, the individual or unit recognized. As well, the digital autograph of a CA that confirmed the particular data and delivered the permit, the tenacity of an unrestricted key encryptions, signatures and certificates’ ratification, besides a date-time through at which the license was released are validated. On the other hand, a PKI certificate is used for executing cryptographies on the web and further internet networks; it is also utilized in the applications, comprising separate certifications for code validation claims, and for verifying digital dealings. The involvement of the digital signatures in the verification of the online documents has enhanced the realization of the goals of Public Key Infrastructure. The digital signatures have been adopted as the original signatures of the emails and online documents like certificates. The Public Key Infrastructure used the digital signatures to identify the source of the licence, the authentic owners, the dates and the validity of such information.

 

 

 

Reference List

Poona, M. and Yama, M., 2018. Digital Signature.

Fiege, T., Groover, M.P. and Hack, M.E., International Business Machines Corp, 2018. Generating public/private key pairs to deploy public keys at computing devices to verify digital signatures. U.S. Patent Application 15/446,700.

Zeilenga, K., 2018. Design Considerations for Digital Signatures in XMPP.

Lozupone, V., 2018. Analyze encryption and public critical infrastructure (PKI). International Journal of Information Management38(1), pp.42-44.

Misra, S., Goswami, S., Taneja, C. and Mukherjee, A., 2016. Design and implementation analysis of a public key infrastructure‐enabled security framework for ZigBee sensor networks. International Journal of Communication Systems29(13), pp.1992-2014.

Bannore, A. and Devane, S.R., 2016, March. Use of proxy signature in e-governance. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (p. 82). ACM.

Rezaeighaleh, H., Laurens, R. and Zou, C.C., 2018, March. Secure Smart Card Signing with Time-based Digital Signature. In 2018 International Conference on Computing, Networking and Communications (ICNC) (pp. 182-187). IEEE.

 

 

 

Appendix

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask