{"id":8118,"date":"2020-08-04T18:47:49","date_gmt":"2020-08-04T18:47:49","guid":{"rendered":"https:\/\/papersspot.com\/blog\/?p=8118"},"modified":"2020-08-04T18:47:56","modified_gmt":"2020-08-04T18:47:56","slug":"role-of-authentication-and-digital-signatures","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2020\/08\/04\/role-of-authentication-and-digital-signatures\/","title":{"rendered":"Role of Authentication and Digital Signatures"},"content":{"rendered":"\n<p>Role of Authentication and Digital Signatures<\/p>\n\n\n\n<p>Introduction<br>With the increasing changes in technology, there are increasing impacts on the society<br>who are affected directly or indirectly by the technology. There have been different preferences<br>by businesses and also organizations on the type of technology they are implementing to help the<br>solve day to day lives. Some of them include digital signatures which are public-key primitives<br>of message authentication. This is a digital way through which personal data and entity is<br>ensured on the digital data. This helps protect documents, data, and information from<br>unauthorized access (Howe, 2015). Due to an increase in technology, there is the need to protect<br>any sensitive information so that it does not land on unauthorized hands. Criminals and hackers<br>might use such information to manipulate government projects and agents with the aim of<br>benefiting from it (Sindhu, 2016). Many corporations in the world, such as Yahoo and Microsoft,<br>have all fallen victims of data breaching and cost them millions of dollars in damages, fines, and<br>also legal fees. Digital signatures use digital appendages that uses some form of cryptography ad<br>also digital certificates as certification documents. With evolving technology, it is essential for<br>digital methods methods to be put into practice so as to decrease the chances of hacking and<br>threats.<br>Thesis: Authentication using digital signatures have ensured that documents for individuals have<br>been protected from landing on unauthorized hands. With the concept, organizations and<br>individuals have seen tremendous increase in safety of documents, and also saving time and<br>money.<br>Purpose<\/p>\n\n\n\n<p>ROLE OF AUTHENTICATION AND DIGITAL SIGNATURES 3<br>The article will play a critical part in giving an insight into digital signatures and<br>authentication and how people should prepare for the future in digital protection of documents. It<br>will also provide an idea of how people and organizations have continued to be affected by<br>cybercrimes, which have continued to deprive them of millions of dollars (Alrehily, 2015). The<br>rise of technological advances has proven to play an integral role in our daily lives. One of the<br>drawbacks of living in a technology-dependent society is that we must face the threats that it<br>comes with. In the past decades, experts and also world governments have continued to work<br>around the clock to understand how hackers are able to break into firewalls and VPNs to attack<br>and manipulate data. An emphasis on securing digital infrastructures can provide reliable<br>services to many by protecting sensitive or classified information.<br>Relevance and Significance<br>The threats on having digital documents not being protected have continued to be<br>devastating and required organizations to improve their defensive systems so as to protect<br>information vital to them. Most of the dangers and also attacks have been made through emails<br>and even as an attachment. There are different types of malware that have continued to be a<br>threat to many networks and programs. Ransomware, a variety of malware that encrypts data,<br>then extorts a ransom in order to unlock releases any information available to the hacker or<br>unauthorized person (Krishna, 2017). Hacking has continued to be a popular way through which<br>people access networks and information without being authorized and attempt to exploit the<br>information in the system and also gather information which would then be used to damage the<br>system physically. Insider threats have been one of the most significant ways through which<br>hackers are able to get access to different systems. Employees at the workplace can give out the<br>information which would then be used to tamper with the networks but can also occur<\/p>\n\n\n\n<p>ROLE OF AUTHENTICATION AND DIGITAL SIGNATURES 4<br>unintentionally.<br>It is imperative to be aware that past threats can act as the foresight to help understand the<br>future and also enable us to prepare well while having enough understanding of how such crimes<br>can cause organizations billions in damages. As a way of ensuring that information is being<br>protected and kept safe, it is important for organizations as well as individuals to make use of<br>digital signatures as a way of authentication and protection of data and information. Digital<br>signatures are important as they reduce the risk of data duplication and also prevent the alteration<br>of the document itself. They also ensure that the documents have been verified legitimate and<br>also authentic. Signatures are provided accompanied by PINs, passwords, and also codes which<br>are important as they ensure the documents will only open when verified by the owner (Paul,<br>2017) . As such, organizations save money, time, and also space through the use of digital<br>signatures for authentication. They have made it easier for managers to keep records and also<br>human resource managers have an easier time protecting information.<br>Conclusion<br>There have been adverse effects as a result of unauthorized access of information inf<br>different organizations across the globe, with many companies such as Yahoo paying millions of<br>dollars several times in fines and also legal fees. In the past few years, there has been an<br>improvement in terms of how companies monitor their information, hiring some of the best IT<br>technicians to protect their data. In the recent past, hackers have continued to change their tactics<br>in response to the changes in cybersecurity being observed by organizations.<\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<p>ROLE OF AUTHENTICATION AND DIGITAL SIGNATURES 5<br>Alrehily, A. D., Alotaibi, A. F., Almutairy, S. B., Alqhtani, M. S., &amp; Kar, J. (2015).<br>Conventional and improved digital signature scheme: A comparative study.&nbsp;Journal of<br>information Security,&nbsp;6(01), 59.<br>Howe, J., P\u00f6ppelmann, T., O&#8217;neill, M., O&#8217;sullivan, E., &amp; G\u00fcneysu, T. (2015). Practical lattice-<br>based digital signature schemes.&nbsp;ACM Transactions on Embedded Computing Systems<br>(TECS),&nbsp;14(3), 1-24.<br>Krishna, A., Narayana, A., &amp; Murthy, S. (2017). A hybrid digital signature scheme on<br>dependable and secure data.&nbsp;International Journal of Electronics and Information<br>Engineering,&nbsp;6(2), 87-93.<br>Paul, E. (2017, September 12). What is Digital Signature- How it works, Benefits, Objectives,<br>Concept. Retrieved August 02, 2020, from emptrust:<br>https:\/\/www.emptrust.com\/blog\/benefits-of-using-digital-<br>signatures#:~:text=Digital%20signatures%20reduce%20the%20risk,identity%20and%20<br>approve%20their%20signatures.<br>Sindhu, B., &amp; Noorullah, R. M. (2016). Secure Elliptic Curve Digital Signature Algorithm for<br>Internet of Things.&nbsp;Global Journal of Computer Science and Technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Role of Authentication and Digital Signatures IntroductionWith the increasing changes in technology, there are increasing impacts on the societywho are affected directly or indirectly by the technology. There have been different preferencesby businesses and also organizations on the type of technology they are implementing to help thesolve day to day lives. Some of them include [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8118","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/8118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=8118"}],"version-history":[{"count":1,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/8118\/revisions"}],"predecessor-version":[{"id":8119,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/8118\/revisions\/8119"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=8118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=8118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=8118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}