2013
DOI: 10.9790/0661-1052631
|View full text |Cite
|
Sign up to set email alerts
|

Achieving data integrity by forming the digital signature using RSA and SHA-1 algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Cryptography is an important tool to manage integrity even though most people associate it with secrecy. Data integrity and authentication/assurance are only some of the examples where cryptography is not used to achieve secrecy, but for data fingerprinting, indexing in hash tables, in combination with a secret cryptographic key to verify data integrity and message authentication, etc (Shingari & Verma, 2013). With technology development and large availability and accessibility of data, cryptography has become crucial to its security.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography is an important tool to manage integrity even though most people associate it with secrecy. Data integrity and authentication/assurance are only some of the examples where cryptography is not used to achieve secrecy, but for data fingerprinting, indexing in hash tables, in combination with a secret cryptographic key to verify data integrity and message authentication, etc (Shingari & Verma, 2013). With technology development and large availability and accessibility of data, cryptography has become crucial to its security.…”
Section: Introductionmentioning
confidence: 99%