A Study about Prevent Tampering with Encrypted Messages over the Network Using Digital Signature
In this paper, we present a proposed model to increase the authenticity of messages sent over the network; our model went through two stages: First, It is the modification of the MD5 algorithm, which is the basic and comprehensive algorithm from which the Digital signature was launched, where we hav...
Saved in:
Main Authors: | Majed Al-khairow, Mohamad Firas Al-halabi |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2022-01-01
|
Series: | Journal of Mathematics |
Online Access: | http://dx.doi.org/10.1155/2022/7546281 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
End hopping based on message tampering
by: Kai LIN, et al.
Published: (2013-12-01) -
Chaos-based encryption and message authentication algorithm for wireless sensor network
by: Tie-ming CHEN, et al.
Published: (2013-05-01) -
Secure obfuscation for encrypted threshold signatures
by: Yahong LI, et al.
Published: (2020-06-01) -
Efficient quantum signature protocol of classical messages
by: WANG Jian, et al.
Published: (2007-01-01) -
Convolutional neural network model over encrypted data based on functional encryption
by: Chen WANG, et al.
Published: (2024-03-01)