Security System for DNS using Cryptography

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2017 by IJETT Journal
Volume-46 Number-9
Year of Publication : 2017
Authors : Ayush Gupta, Ankur Patel, Lucknesh Kumar, DipanshuTomar
DOI :  10.14445/22315381/IJETT-V46P281


Ayush Gupta, Ankur Patel, Lucknesh Kumar, DipanshuTomar "Security System for DNS using Cryptography", International Journal of Engineering Trends and Technology (IJETT), V46(9),462-465 April 2017. ISSN:2231-5381. published by seventh sense research group

DNS, Domain Name System is a protocol that resolves hostnames to IP Addresses over the Internet. DNS, being an open source, it is less secure and it has no means of determining whether domain name data comes from an authorised domain owner. So, these vulnerabilities lead to a number of attacks, such as, cache poisoning, cache spoofing etc. Hence, there is a need of securing DNS. Digital Signatures are a good way of authenticating the domain owners. The paper presents the Domain Name System security concept,.Digital Signature algorithms helps in providing good level of security to DNS. Software like OpenDNSSEC, BIND, Secure64 etc. It involves the signing of DNS using cryptographical algorithms (e.g., RSA, DSA etc.). Further, ECDSA is one way that provides same level of security, as security provided by RSA for low power and portable devices. So, here we proposing a new ECDSA implementation that can be used to secure DNS.


[1] Hu Junru, “The Improved Elliptic Curve Digital Signature Algorithm”, International Conference on Electronic & Mechanical Engineering and Information Technology, IEEE, 2011
[2] Casey Deccio, Jeff Sedayao and Krishna Kant, Prasant Mohapatra, ”Quantifying and Improving DNSSEC Availability?, IEEE, 2011.
[3] Ghanmy Nabil, KhlifNaziha, “Hardware implementation of Elliptic Curve Digital Signature Algorithm (ECDSA) on Koblitz Curves” 8th IEEE, IET International Symposium on Communication Systems, Networks and Digital Signal Processing, IEEE, 2012.
[4] AqeelKhalique, Kuldip Singh, SandeepSood, “Implementation of Elliptic Curve Digital Signature Algorithm”, International Journal of Computer Applications (0975 – 8887) Volume 2 – No.2, May 2010
[5] VivekKapoor, Vivek Sonny Abraham, Ramesh Singh, Elliptic Curve Cryptography, May 20-26, 2008. ACM Ubiquity, Volume 9, Issue 20.[6]Daniel J. Bernstein, NielsDuif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang, “High-speed highsecurity signatures”, 2011.
[6] Xue Sun, Mingping Xia, “An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography”, International Conference on Computer and Communications Security, IEEE, 2009.
[7] Jonathan Petit, “Analysis of ECDSA Authentication Processing in VANETs”, IEEE, 2009.
[8] Qingkuan Dong, Guozhen Xiao, “A Subliminal-Free Variant of ECDSA Using Interactive Protocol”, IEEE, 2010.
[9] Jalel Ben-othman, Yesica Imelda Saavedra Benitez, “A light weight security scheme for HWMP protocol using Elliptic Curve Technique”, 11th IEEE International Workshop on Wireless Local Networks, IEEE,
[10] Zhang Youqiao ,ZhouWuneng, “An ECDSA Signature Scheme Designs for PBOC 2.0 Specifications”, 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012), IEEE, 2012.
[11] Ravi Kishore Kodali, “Implementation of ECDSA in WSN”, International Conference on Control Communication and Computing (ICCC), IEEE, 2013.
[12] ShwetaLamba, Monika Sharma, “An Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)”, International Conference on Machine Intelligence Research and Advancement, IEEE, 2013.
[13] Noura Ben Hadjy Youssef, Wajih El HadiYoussef , Mohsen Machhout, RachedTourki, “A Low-Resource32-bit Datapath ECDSA Design for Embedded Applications”, IEEE, 2014.