Enhanced Secured Wireless Message Communication using Digital Signature Algorithm (DSA)

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2018 by IJETT Journal
Volume-62 Number-2
Year of Publication : 2018
Authors : Ade, Sandra Ngi, Eru, Nathaniel Akwuma, Nyamtswam, Ngunengen and Ayangeaor, Raphael Terkende
DOI :  10.14445/22315381/IJETT-V62P215

Citation 

MLA Style: Ade, Sandra Ngi, Eru, Nathaniel Akwuma, Nyamtswam, Ngunengen and Ayangeaor, Raphael Terkende "Enhanced Secured Wireless Message Communication using Digital Signature Algorithm (DSA)" International Journal of Engineering Trends and Technology 62.2 (2018): 96-105.

APA Style:Ade, Sandra Ngi, Eru, Nathaniel Akwuma, Nyamtswam, Ngunengen and Ayangeaor, Raphael Terkende (2018). Enhanced Secured Wireless Message Communication using Digital Signature Algorithm (DSA) International Journal of Engineering Trends and Technology, 62(2), 96-105.

Abstract
This paper focuses on how to protect communications that occur in a transaction so as to guide against fraudsters. Digital Signature Algorithm (DSA) is adopted to be used with the Secure Hash Algorithm-2 (SHA-2). The security of the DSA is based on the difficult computable nature of discrete logarithm over finite fields; as such, the current key size of the DSA is small and thus makes it easy for an attacker to launch a brute force attack. In order to counter this problem, the size of the prime numbers that form the basis of the key generation process used in the DSA has being increased. In Digital Signatures, the message sent to the recipient is digitally signed, but not encrypted hence, the message’s confidentiality is not guaranteed. This work therefore incorporates encryption to a digitally signed message to ensure the message’s absolute privacy. This eliminates the possibility of eavesdropping which also improves the security of the DSA. An object oriented approach is used to model the new system. The implementation of the system is done using Java Enterprise Java Bean 3 at the front end and MySQL database server is used at the back end for persistent storage of messages, private and public keys running on JBOSS server.

Reference
[1] McNulty, F. (1999). Encryption’s Importance to Economic and Infrastructure Security. Retrieved from scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1234&context=djcil.pdf.
[2] Bhatia, P., & Sumbaly, R. (2013). Framework for Wireless Network Security using Quantum Cryptography. Retrieved from https://arxiv.org/pdf/1412.2495.pdf.
[3] Yakubu, B. M. (2015). Advanced Secure Method for Data Transmission in Manet using RSA Algorithm. International Journal of Advanced Technology in Engineering and Science, 10.
[4] Kessler, G. C. (1999, May 13). An Overview of Cryptography. McGraw-Hill.
[5] Gupta, A., Patel, A., Kumar, L., & Tomar, D. (2017). Security System for DNS using Cryptography. International Journal of Engineering Trends and Technology (IJETT), 46 (9), 462–465.
[6] Krishna, D. S. (2015). Providing Security to Confidential Information Using Digital signature. International Journal of Advance Research in 1Computer Science and Management Studies, 5.
[7] Stallings, W. (2011). Cryptograpy and Network Security Principles and Practices (Fifth Edition). New York: Prentice Hall.
[8] Torres, A. (2013, 8 14). Retrieved from pythoncentral: http://pythoncentral.io/hashing-strings-with-python/
[9] Gallagher, P. D. (2013). Federal Information Processing Standards Publication- Digital Signature Standard (DSS). Gaithersburg, MD 20899-8900.
[10] Raheja, S., Verma, S., & Raheja, N. (2014). Review and Analysis of Hashing Techniques.
[11] International Journal of Advanced Research in Computer Science and Software Engineering, 296-298.
[12] Chang, S.J., Perlner, R., Burr, W. E., Turan, M. S., Kelsey, J. M., & Paul, S. (2012). Third-Round Report on SHA-3 Cryptographic Hash Algorithm Competition. United States: National Institute of Standard and Technology.
[13] Keizer, G. (2012, 06 05). Six Steps to a better Security Strategy. Retrieved from Computer World: www.computerworld.com/article/2503916/malware-vulnerabilities/researchers-reveal-how-flame-fakes-windows-update.html
[14] Simion, E. (2012, 12). The Birthday paradox. Operational Research and Optimization .
[15] Stevens, M. (2013). New Attacks on SHA-1 based on Optimal Joint Local- Collision Analysis. Lecture Notes in Computer Science, vol. 7881, Springer, pp. 245-261
[16] McCurley, S., & Gordon. (1999). Elliptic Elliptic Curves and Their Applications to Cryptography: An Introduction. https://books.google.com.ng/books?isbn=0792385896: Springer shop Amazon.com
[17] Buchman, J. (2001, 12 15). The Digital Signature Algorithm (DSA). Retrieved from https://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1003_DSA.pdf
[18] Greg, C. (2011). Enhancing Website security with Algorithm Agility. Symantec
[19] Co-operation.
[20] Chang, S.j., Perlner, R., Burr, W. E., Turan, M. S., Kelsey, J. M., & Paul, S. (2012). Third-Round Report on SHA-3 Cryptographic Hash Algorithm Competition. United States: National Institute of Standard and Technology.
[21] Schneier, B. (2012). Applied Cryptography (2nd Edition). John Wiley & Sons.

Keywords
Cryptography, DSA (Data/Digital Signature Algorithm, SHA (Secure Hash Algorithm), MD (Message Digest), Cryptosystem, Encryption, Secret/Private Key, Public Key, RSA.