INTRODUCTION
This paper will focus on Authentication and Digital Signatures, and outline strategies for Implementation, present techniques on how to apply, adapt, and extend Authentication and Digital Signatures in areas such as encryption, and verification. Digital signatures prevent persons from acting as the originator of a specific document, which is comparable to forgery on a printed text. Authentication is the primary and most critical line of defense in a system and public networks. It is now common in many stores where credit card payment can be electronically signed using a stylus. Digital signatures, however, similar to conventional signatures, can be risky; once a digital signature is exposed to the populace, it is bound to be fabricated. Digital signatures nonetheless have extra characteristics which do not exist in traditional signatures. These additional data can be used to strengthen the signature authentication procedure.
There are times when old fashion solutions do not meet our modern day demands; for an example signing a document or contract with a pen and paper. Which is a waste of time since It could take a week for a paper document to reach its final destination, whereas digitally signing a document takes a few minutes. The modern world requires more flexibility and a responsive solution …show more content…
A person who can illicitly obtain a private key can impersonate the owner of the private key during public key cryptography actions. Depending on the security roles granted by the authorized use of the private key, a compromised private key can be used to abuse network resources, steal valuable data, and destroy reputations. Cryptographic algorithms can implement encryption and decryption of information for data confidentiality, message authentication codes for data integrity and entity authentication, as well as digital signatures, and