Analysis on Digital Signature, Based on Digital Certificate
DOI:
https://doi.org/10.53983/ijmds.v14n7.005Keywords:
Digital Signature, Digital Certificate, Reed Solomon, QR Codes, Signing systemAbstract
This thesis investigates the use of Digital Signatures based on Digital Certificates to enhance document security and combat forgery and tampering. Emphasizing their role in strengthening existing signing systems, the study explores the implementation of a QR code integrated with a digital signature using the Reed Solomon Correction Method, which ensures accurate scanning even with partial damage. The framework enables the creation of legally binding, reliable, and verifiable electronic documents. Performance evaluation was conducted using JMeter, and the system achieved prediction accuracies ranging from 65 to 98 out of 100, with an overall accuracy of 97%. The findings confirm the reliability, portability, and minimal repudiation of the proposed system, while also highlighting the importance of a scanning verification mechanism to foster user trust. The study identifies current limitations, particularly the need to expand the dataset and quantitative variables, and provides a solid foundation for future improvements and research in digital signing systems.
Downloads
References
Antunes, H., Maximiano, M., Gomes, J., & Pinto, A. (2021). Enhancing electronic document workflows with secure digital signature solutions. International Journal of Information Security Science, 10(1), 20-29.
Bazina, M., Bimenyimana, S., & Idahemuka, M. (2024). Mathematics Teachers’ Perceptions on the Use of Technological Tools in Teaching and Learning Practices in Selected Rwandan Secondary Schools. African Journal of Empirical Research, 5(3), 813-821.
Boyen, X., & Waters, B. (2006). Transitive signatures for cross-certification and delegable credentials. In CEUR Workshop Proceedings.
Camenisch, J., Sommer, D., & Zwicky, J. (2005). Addressing privacy and usability shortcomings in identity management systems. IBM Research Report.
Chokhani, S., Forde, L., & Housley, R. (2003). Internet X.509 public key infrastructure: Certificate policy and certification practices framework. RFC 3647. Internet Engineering Task Force.
Clark, J., & Van Oorschot, P. C. (2013). SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. In IEEE Symposium on Security and Privacy, 2(1), 511-525.
Commission of the European Communities. (2007). E inclusion strategies in EU member states within i2010 initiative. Brussels: European Commission.
Eck, D. J., & Colleges, H. (2010). Introduction to programming using Java (6th ed.). Hobart and William Smith Colleges. https://math.hws.edu/javanotes/
Egoshin, N. S., Konev, A. A., & Shelupanov, A. A. (2020). A model of threats to the confidentiality of information processed in cyberspace based on the information flows model. Symmetry, 12(11), 1792. https://doi.org/10.3390/sym12111792.
Elbehiery, H. (2019). QR codes and barcode technologies for secure document sharing. Journal of Advanced Digital Systems, 7(2), 88-95.
Hans van Vliet. (2007). Software engineering: Principles and practice (3rd ed.). Chichester: Wiley.
Housley, W., Ford, W., Polk, W., & Solo, D. (2002). Internet X.509 public key infrastructure certificate and CRL profile. RFC 3280. Internet Society.
Islam, S. (2011). Software development risk management model: A goal-driven approach. Software Systems Engineering Institute, University of Munich.
ISO/IEC. (2004). ISO/IEC 13888-1:2004 - Information technology - Security techniques —-Non-repudiation - Part 1: General. Geneva: International Organization for Standardization.
Jablonski, S., & Bussler, C. (1996). Workflow Management: Modeling Concepts, Architecture and Implementation. London: International Thomson Computer Press.
Java Platform. (2023). Java SE Documentation: Cryptography architecture (JCA). Oracle. https://docs.oracle.com/en/java/
Katz, J. (2004). Digital signatures. Handbook of Information Security, 1(2), 391-406).
Kendall, K. E., & Kendall, J. E. (2010). Systems analysis and design (8th ed.). Upper Saddle River, NJ: Prentice Hall.
Kim, G., Humble, J., Debois, P., Willis, J., & Allspaw, J. (2016). The DevOps handbook: How to create world-class agility, reliability, and security in technology organizations. Portland: IT Revolution Press.
Lemay, L., & Perkins, C. L. (2010). Java Web Services: Up and Running. O'Reilly Media.
Martínez-Costa, C., & Schulz, S. (2012). Digital signatures over semantic data: challenges and solutions. Journal of Biomedical Semantics, 3(Suppl 1), S1.
Mason, S. (2016). Electronic Signatures in Law (4th ed.). Cambridge University Press.
McGuinness, D., Hendler, J., Fox, P., & Dumontier, M. (2015). The emerging science of linked data. IEEE Intelligent Systems, 30(1), 83-88.
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. Boca Raton: CRC Press.
Muller, G. (2018). Systems architecting: A business perspective. Delft: TU Delft Open Publishing.
Naseer, H., Mumtaz Bhutta, M. N., & Alojail, M. A. (2020). A key transport protocol for advance metering infrastructure (AMI) based on public key cryptography. In Proceedings of the International Conference on Cyber Warfare and Security (ICCWS).
NIST. (2013). Digital Signature Algorithm (DSA) standard. FIPS PUB 186-4. Gaithersburg, MD: National Institute of Standards and Technology.
Patel, A. (2019). Elliptic Curve Digital Signature Algorithm. International Journal of Advanced Computational Science & Applications, 10(2), 77-81.
Ramadani, N. S., Misimi, V., Ramadani, E., & Idrizi, F. (2017). The role and the impact of digital certificate and digital signature in improving security during data transmission. International Journal of Information Security, 2(1), 116-120.
Rathnayaka, I. G. U. D. (2020). A review of software development methodologies in software engineering. International Journal of Computer Science and Software Engineering, 9(3), 54-60.
Sanda, S., & Amirisetti, S. (2016). Biometric online signature verification using HSV, GMM, and LCSS methods. Procedia Computer Science, 85, 700–707.
Sharma, D. (2017). A review of QR code structure for encryption and decryption process. International Journal of Innovative Science, Research and Technology, 2(2), 13-18.
Shelly, G. B., & Rosenblatt, H. J. (2010). Systems analysis and design (9th ed.). Boston, MA: Cengage Learning.
Singh, V., & Pandey, S. K. (2020). Revisiting cloud security threats: Repudiation attack. International Journal of Recent Technology and Engineering, 8(5), 1790-1798.
Sommerville, I. (2011). Software engineering (9th ed.). Boston: Pearson Education.
Tirado, A. R., Gutierrez, F. A., & Gonzalez, C. E. (2016). Designing a secure digital signature system for web services using PKI. International Journal of Computer Applications, 145(1), 25-31.
Valacich, J. S., & George, J. F. (2021). Modern systems analysis and design (9th ed.). Boston: Pearson Education.
Van Der Aalst, W. M. P., & Van Hee, K. M. (2004). Workflow Management: Models, Methods, and Systems (Vol. 52). Berlin: Springer.
White, S., & Miers, D. (2008). BPMN modeling and reference guide: Understanding and using BPMN. Lighthouse Point, FL: Future Strategies.
Zima, D. (2015). Modern methods of software development. Task Quarterly, 19(4), 481-493.