International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 05 | May -2017
p-ISSN: 2395-0072
www.irjet.net
Digital Signature Authentication and Verification on Smart Phones using CRPT Algorithm Aishwarya Mali1, Chinmay Mahalle2, Mihir Kulkarni3, Tejas Nangude4, Prof. Geeta Navale5 Final Year Student, Department of Computer Engineering, Sinhgad Institute of Technology and Science, Maharashtra, India 5 Project Guide, Department of Computer Engineering, Sinhgad Institute of Technology and Science, Maharashtra, India 1234
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - With the use of mobile devices as a client for
This can be done using technique known as cryptography. If a digitally signed document is sent over internet, the sent document and the received document both are genuine. Cryptography is a method of storing and transmitting data in a particular form so that only for those it is contemplated can read or process it. This can be done effectively in smartphones. It is the method of encoding the content so that for whom it is intended only can read it. Digital signature is a code which is generated by public key encryption and is used to authenticate and verify the document sent over a network. It is also used to verify the sender’s identity.
internet, the threat of unauthorized and unauthenticated access of crucial documents (e.g.: contracts, bonds, receipts, etc.) is increasing day by day. Although Digital Signature is meant to be the solution for the unauthorized access, its implementation is not adequate till now. Symmetric data transfer mechanism is used for the transfer of important documents, but there is a need of more competent mechanism for safe transfer and verification of the documents. Here we contemplate a RESTful service as well as Jersey Framework enabled data transfer mechanism for the transfer of document using Smart Phones. We have suggested the design of CRiPT (Cipher using Random Integer Procreation and Translation) Algorithm in this paper. CRiPT algorithm not only defines effective cryptography but is also light weighed; thus effective for smart-phones. Cryptography concepts – Random number generation, have been used to develop an encryptiondecryption algorithm to obtain a ciphered Digital Signature for security purposes. Use of Digital Signature resolves the Document Authentication issue. A Hash-value based verification process is defined to ensure that an authenticated sender has only sent the document to intended recipient. The main aim is to tackle issues related to digital document transfer over the network, by making the overall process handy using Smart phones as well as ensuring Information Security.
Today digital signatures are being used in many different forms. Some use a literal signature of a person on screen and detect it using image processing techniques. This is not very reliable process as handmade signature might slightly differ from each other and result in forbidden access. Also another way is carrying a small USB device containing our digital signature and connecting the device to system to embed the digital signature. The limitation for this is that our signature totally depends upon the device we carry with us. If the device itself is stolen or misplaced, we might land up in trouble. Moreover, the device is expensive. The most secured way for implementation of digital signatures considered on this date is biometric signatures. But again, all the smartphones are not provided with biometric security systems. So in this paper we present a cost effective, simple, accurate, highly secured Digital Signature authentication and verification technique using smartphones.
Key Words: Digital Signature, RESTful service, Jersey Framework, Cryptography, Random number generation, Authentication, Verification, Information Security.
There are different survey papers that cover different aspects of the cryptography technology. For example, in [7] we study about the existing techniques developed using cryptography. Also the advantages and disadvantages of these techniques are seen here. In [2], we see how a low cost digital signature can be developed and can anomalous behavior in the system be identified. Moreover, paper [3] shows us technique to use digital signature architecture that can be used for web-based application. And paper [1] tells us what the existing methods of using digital signatures are in mobile device systems.
1.INTRODUCTION Smartphones are being used on a great scale now-a-days. Many daily activities depend on it, making it a very integral part of life. It might contain a lot of private information such as pictures, passwords, call logs, messages, etc. of the user. This information is highly vulnerable if at all smartphone is stolen or borrowed. Also, this includes sending document over the internet through smartphones. Some documents might be highly confidential and require a high level of security while transferring because of the threat of document being intercepted.
© 2017, IRJET
|
Impact Factor value: 5.181
The rest of the paper is organized as follows: Section II provides the literature survey of referred papers. Section III
|
ISO 9001:2008 Certified Journal
|
Page 332