Issuing Digital Signatures for Integrity and Authentication of Digital Documents

Authors

  • Hassan Kassim Albahadily department of Computer Science, College of Science, Mustansiriyah University, 10052 Baghdad, IRAQ.
  • Ismael Abdulsatar Jabbar Department of Computer Science, College of Science, Mustansiriyah University, 10052 Baghdad, IRAQ.
  • Alaa Abdulhussaien Altaay Department of Computer Science, College of Science, Mustansiriyah University, 10052 Baghdad, IRAQ.
  • Xunhuan Ren Belarusian State University of Informatics and Electronics, Minsk, Belarus.

DOI:

https://doi.org/10.23851/mjs.v34i3.1278

Keywords:

MD5, Verification, Authintication

Abstract

In this paper, we developed a secure system for issuing digital signature for digital documents and certificates using message digest algorithm (MD5). The developed system is providing the integrity and authentication for certificates by combining the information of participant and supply them to MD5 algorithm to produce a unique hash key of 32 digits which is hard to guess or attack. The process provides a certificate which allows for the authentication of a document at any time. The proposed system used and tested to produce digital certificate for participant of electronic seminars in Mustansiriyah university which were about 1000 certificate. The results were good and very fair to authenticate certificates and preventing forgery.

Downloads

Download data is not yet available.

References

A. Rawat, D. Agrawal, An Enhanced Message Digest Hash Algorithm for Information Security, 2015.

R. Kundu, A. Dutta, Cryptographic Hash Functions and Attacks-A Detailed Study. International Journal of Advanced Research in Computer Science, 2020, vol. 11, No. 2.

CrossRef

W. Easttom, Cryptographic Hashes. In Modern Cryptography, Springer, Cham, 2021, pp. 205-224.

CrossRef

J. Ismael Abdul Sattar, S.Hameed Shaker, and Mohammed Najm Abdullah. "Database meet Link generator based on linear feedback shift register and message digest algorithm." Webology (2022): 2236-2243.

M. Al-Awawdeh, Strengthening the MD5 File Integrity Algorithm with User Fingerprint (Doctoral dissertation, Middle East University), 2019.

Sattar Jabbar, Ismael Abdul, Hassan Kassim Albahadilyr, and Alaa A. Jabbar Altaay. "Design and Implementation Digital Invitation System Based on Secure Hash Algorithm 3." International Journal of Online & Biomedical Engineering 19.5 (2023).

CrossRef

N. Kishore, P. Raina, Parallel cryptographic hashing: Developments in the last 25 years. Cryptologia, vol. 43, No. 6, 2019, pp. 504-535.

CrossRef

Sattar, Ismael Abdul, and Jamal Nasir Hasoon. "Hiding System Based on Double MD5 Hashes and LFSR Generators." (2013).

S. Long, A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512. In Journal of Physics: Conference Series, vol. 1314, No. 1, 2019, p. 12210).

CrossRef

M. Gillela, V. Prenosil, and V. Ginjala, Parallelization of brute-force attack on MD5 hash algorithm on FPGA. In 2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID), 2019, pp. 88-93.

CrossRef

F. Sagar, Cryptographic Hashing Functions-MD5. no. September, 2016, pp.1-9.

P. Gupta, S Kumar, A comparative analysis of SHA and MD5 algorithm. architecture, 1, 2014, p. 5.

J. Ismael AbdulSattar, S. Hameed Shaker. "Adaptive Hiding Algorithm Based on Mapping Database." iJIM 17.01 (2023): 97.

CrossRef

Downloads

Key Dates

Published

30-09-2023

Issue

Section

Original Article

How to Cite

[1]
H. K. Albahadily, I. A. Jabbar, A. A. Altaay, and X. . Ren, “Issuing Digital Signatures for Integrity and Authentication of Digital Documents”, Al-Mustansiriyah Journal of Science, vol. 34, no. 3, pp. 50–55, Sep. 2023, doi: 10.23851/mjs.v34i3.1278.