Security System for DNS using Cryptography
Citation
Ayush Gupta, Ankur Patel, Lucknesh Kumar, DipanshuTomar "Security System for DNS using Cryptography", International Journal of Engineering Trends and Technology (IJETT), V46(9),462-465 April 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
DNS, Domain Name System is a protocol that resolves
hostnames to IP Addresses over the Internet. DNS,
being an open source, it is less secure and it has no
means of determining whether domain name data
comes from an authorised domain owner. So, these
vulnerabilities lead to a number of attacks, such as,
cache poisoning, cache spoofing etc. Hence, there is a
need of securing DNS. Digital Signatures are a good
way of authenticating the domain owners. The paper
presents the Domain Name System security
concept,.Digital Signature algorithms helps in
providing good level of security to DNS. Software like
OpenDNSSEC, BIND, Secure64 etc. It involves the
signing of DNS using cryptographical algorithms
(e.g., RSA, DSA etc.). Further, ECDSA is one way that
provides same level of security, as security provided
by RSA for low power and portable devices. So, here
we proposing a new ECDSA implementation that can
be used to secure DNS.
References
[1] Hu Junru, “The Improved Elliptic Curve Digital Signature
Algorithm”, International Conference on Electronic &
Mechanical Engineering and Information Technology, IEEE,
2011
[2] Casey Deccio, Jeff Sedayao and Krishna Kant, Prasant
Mohapatra, ”Quantifying and Improving DNSSEC
Availability?, IEEE, 2011.
[3] Ghanmy Nabil, KhlifNaziha, “Hardware implementation of
Elliptic Curve Digital Signature Algorithm (ECDSA) on
Koblitz Curves” 8th IEEE, IET International Symposium on
Communication Systems, Networks and Digital Signal
Processing, IEEE, 2012.
[4] AqeelKhalique, Kuldip Singh, SandeepSood, “Implementation
of Elliptic Curve Digital Signature Algorithm”, International
Journal of Computer Applications (0975 – 8887) Volume 2 –
No.2, May 2010
[5] VivekKapoor, Vivek Sonny Abraham, Ramesh Singh, Elliptic
Curve Cryptography, May 20-26, 2008. ACM Ubiquity,
Volume 9, Issue 20.[6]Daniel J. Bernstein, NielsDuif, Tanja
Lange, Peter Schwabe, and Bo-Yin Yang, “High-speed highsecurity
signatures”, 2011.
[6] Xue Sun, Mingping Xia, “An Improved Proxy Signature
Scheme Based on Elliptic Curve Cryptography”, International
Conference on Computer and Communications
Security, IEEE, 2009.
[7] Jonathan Petit, “Analysis of ECDSA Authentication
Processing in VANETs”, IEEE, 2009.
[8] Qingkuan Dong, Guozhen Xiao, “A Subliminal-Free Variant
of ECDSA Using Interactive Protocol”, IEEE, 2010.
[9] Jalel Ben-othman, Yesica Imelda Saavedra Benitez, “A light
weight security scheme for HWMP protocol using Elliptic
Curve Technique”, 11th IEEE International Workshop on
Wireless Local Networks, IEEE,
[10] Zhang Youqiao ,ZhouWuneng, “An ECDSA Signature
Scheme Designs for PBOC 2.0 Specifications”, 9th
International Conference on Fuzzy Systems and Knowledge
Discovery (FSKD 2012), IEEE, 2012.
[11] Ravi Kishore Kodali, “Implementation of ECDSA in
WSN”, International Conference on Control Communication
and Computing (ICCC), IEEE, 2013.
[12] ShwetaLamba, Monika Sharma, “An Efficient Elliptic Curve
Digital Signature Algorithm (ECDSA)”, International
Conference on Machine Intelligence Research and
Advancement, IEEE, 2013.
[13] Noura Ben Hadjy Youssef, Wajih El HadiYoussef , Mohsen
Machhout, RachedTourki, “A Low-Resource32-bit Datapath
ECDSA Design for Embedded Applications”, IEEE, 2014.
Keywords
DNS, RSA, ECDSA, ECDLP,DNSSEC, DSA and ECC.