Issuing Digital Signatures for Integrity and Authentication of Digital Documents
Keywords:MD5, Verification, Authintication
In this paper, we developed a secure system for issuing digital signature for digital documents and certificates using message digest algorithm (MD5). The developed system is providing the integrity and authentication for certificates by combining the information of participant and supply them to MD5 algorithm to produce a unique hash key of 32 digits which is hard to guess or attack. The process provides a certificate which allows for the authentication of a document at any time. The proposed system used and tested to produce digital certificate for participant of electronic seminars in Mustansiriyah university which were about 1000 certificate. The results were good and very fair to authenticate certificates and preventing forgery.
A. Rawat, D. Agrawal, An Enhanced Message Digest Hash Algorithm for Information Security, 2015.
R. Kundu, A. Dutta, Cryptographic Hash Functions and Attacks-A Detailed Study. International Journal of Advanced Research in Computer Science, 2020, vol. 11, No. 2.
W. Easttom, Cryptographic Hashes. In Modern Cryptography, Springer, Cham, 2021, pp. 205-224.
J. Ismael Abdul Sattar, S.Hameed Shaker, and Mohammed Najm Abdullah. "Database meet Link generator based on linear feedback shift register and message digest algorithm." Webology (2022): 2236-2243.
M. Al-Awawdeh, Strengthening the MD5 File Integrity Algorithm with User Fingerprint (Doctoral dissertation, Middle East University), 2019.
Sattar Jabbar, Ismael Abdul, Hassan Kassim Albahadilyr, and Alaa A. Jabbar Altaay. "Design and Implementation Digital Invitation System Based on Secure Hash Algorithm 3." International Journal of Online & Biomedical Engineering 19.5 (2023).
N. Kishore, P. Raina, Parallel cryptographic hashing: Developments in the last 25 years. Cryptologia, vol. 43, No. 6, 2019, pp. 504-535.
Sattar, Ismael Abdul, and Jamal Nasir Hasoon. "Hiding System Based on Double MD5 Hashes and LFSR Generators." (2013).
S. Long, A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512. In Journal of Physics: Conference Series, vol. 1314, No. 1, 2019, p. 12210).
M. Gillela, V. Prenosil, and V. Ginjala, Parallelization of brute-force attack on MD5 hash algorithm on FPGA. In 2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID), 2019, pp. 88-93.
F. Sagar, Cryptographic Hashing Functions-MD5. no. September, 2016, pp.1-9.
P. Gupta, S Kumar, A comparative analysis of SHA and MD5 algorithm. architecture, 1, 2014, p. 5.
J. Ismael AbdulSattar, S. Hameed Shaker. "Adaptive Hiding Algorithm Based on Mapping Database." iJIM 17.01 (2023): 97.
How to Cite
Copyright (c) 2023 Al-Mustansiriyah Journal of Science
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Articles accepted for publication in Al-Mustansiriyah Journal of Science (MJS) are protected under the Creative Commons Attribution 4.0 International License (CC BY-NC). Authors of accepted articles are requested to sign a copyright release form prior to their article being published. All authors must agree to the submission, sign copyright release forms, and agree to be included in any correspondence between MJS and the authors before submitting a work to MJS. For personal or educational use, permission is given without charge to print or create digital copies of all or portions of a MJS article. However, copies must not be produced or distributed for monetary gain. It is necessary to respect the copyright of any parts of this work that are not owned by MJS.