Open Access Open Access  Restricted Access Subscription or Fee Access

Digital Authentication

R. Rajkumar, B. Balamurugan, B. Gokul Prasanth, B. Santhana Balasubramanian


The Information Technology Act 2000 (IT Act) dictates digital signatures namely a skill about authentication or safety of electronic documents. Digital syllable is an electronic character up to expectation creates apprehension into and being a statistics record. The purpose over validation then authentication regarding digital documents. Validation refers after the process about certifying the contents regarding the document, while authentication refers in imitation of the technique about certifying the sender over the document. It do stay stated that a digital syllable is an electronic version concerning a handwritten signature. The signing system is carried out together with the help of public answer cryptography; the signatory use her non-public accomplishment in imitation of effect a digital symbolic letter for a document. It is chronic in imitation assure that the unique content material over the information yet report as has. Its different disposition has provided easy, faster, accurate yet convenient mechanism because creating transmission then retrieval regarding facts without involving regular paper based formalities. This has elevated the makes use of concerning digital technological know-how into epoch in conformity with period life as has conducted the ball according to run online that in turn has increased techno-dependency. Increasingly the business dealings, communication, reputable information then commercial transactions are weight born out among cyberspace. There has been variation about ball from demand bill based in imitation of digital based work. In the last little years, in that place has been a swiftly increasing make a bid because of a assignment digital letter framework because each public and common sector. The discipline revolves round the most data about digital signature, the after concerning Information Technology.

Full Text:



Goldreich, Oded (2001), Foundations of cryptography I: Basic Tools, Cambridge: Cambridge University Press, ISBN 978-0-511-54689-1

Goldreich, oded(2004),Foundation of cryptography II: Basic Applications (1. publ. ed.), Cambridge [u.a.]: Cambridge Univ. Press, ISBN 978-0-521-83084-3

Pass, Rafael, A Course in Cryptography (PDF), retrieved 31 December 2015

Technology Brief. University of Guelph. September 2006. Retrieved 28 March 2014

Private key for producing digital Signature using the Ed25519 algorithm.

Harika Asili and Omer Ozgur Tanriover 2014, Comparison of Document Manage-ment Systems by Meta Modeling and Workforce Centric Tuning Measures (pag. [1-2])

Beryl Plimmer and Mark Apperley 2007, Making Paperless Work (pag. [1-2])

Hind Zantout and Farhi Marir 1999, Document management systems from current capabilities towards intelligent information retrieval: an overview (pag. [1-2])

Intergraph 2013, Enterprise Content Management (ECM) Overview Majid Vesali 2012, Paperless Office (pag. [1-7])

Abigail J. Sellen and Richard H. R. Harper 2003, The Myth of the Paperless Office(pag. 17); The MIT Press; 1st edition

James Nye 2009, Issues and Disadvantages of moving to a paperless once.

Babette Alberts and Simone van der Hof, Digital Signature Blindness – Analysis of legislative approaches toward electronic authentication (page. [7,8])


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.