Application of the Enhanced SHA-1

'Digital Signature Scheme for Email Messages' tutorial was cited in a JOURNAL OF APPLIED SCIENCES RESEARCH paper in 2015.

The Digital Signature Scheme for Email Messages tutorial was cited in a JOURNAL OF APPLIED SCIENCES RESEARCH paper in 2015.

Subject: Application of the Enhanced SHA-1 for On-line Authentication 
   and Security of Documents
Date: 31 October 2015
Author: Christine Charmaine G. San Jose, Bobby D. Gerardo and 
   Bartolome T. Tanguilig III
Source: http://www.aensiweb.net/AENSIWEB/jasr/jasr
   /2015/Special%20IPN%20Oct/47-52.pdf

...
A digital signature consists of a mathematical
calculation that demonstrates the authenticity of a
message. Dr. Herong Yang [14] discussed the use of
hash algorithm in a digital scheme for e-mail
messages. A digital signature scheme for e-mail
messages consist of a sender that has a privatepublic
pair, a sender generates a digital signature the
private key and a message digest of the original
email, a digital signature is attached to the email and
delivered to the receiver, a receiver decrypts the
digital signature using the sender's public key and
compares with the message digest of the received
email and lastly, the receiver knows that received
email has been tampered with by a third party if the
message digest does not match the decrypted digital
signature. 
...

13. Phys.Org, 2009. “Bell Labs breaks optical transmission record”,
http://phys.org/news/2009-09-bell-labs-opticaltransmission-
petabit.html

14. Yang, H., Digital Signature Scheme for E-mail Messages. PKI 
Tutorials. http://www.herongyang.com/PKI/SMIMEDigital-Signature
-Scheme-for-EmailMessages.html

15. Schneier, B., 2005. Schneier Security. Article: Cryptanalysis of 
SHA-1, https://www.schneier.com/blog/archives/2005/02
/cryptanalysis_o.html
...

Table of Contents

 About This Book

 Reference Citations in 2016

Reference Citations in 2015

 SSL/TLS Overview - Change Cipher Spec Protocol

 PFX to Java Keystore / Extract private key from Java Keystore

 Android talks #08 decompiling android applications

 Cpronto 2.5 Administration Guide

 IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW

 Cryptographic Protocols - The Peruvian Coin Flip

 How to View XML Files

 Bug 378637 - Add support for connecting to HTTP proxy over HTTPS

 an information literacy technology for chemistry documents

 org.jruby.exceptions.RaiseException: stack level too deep

 Another function that helps programmers calculate

 CONNECTING TO A SOAP WEB SERVICE

Application of the Enhanced SHA-1

 New Media Workshop [COMM7200]

 Apex Soap call authentication problem

 Recording Video of an Android Device

 Java HTTPS server code failing

 How to Capture Logcat Files Using ADB

 Modifying and Recompiling Settings.APK

 Reference Citations in 2014

 Reference Citations in 2013

 Reference Citations in 2012

 Reference Citations in 2011

 Reference Citations in 2010

 Reference Citations in 2009

 Reference Citations in 2008

 Reference Citations in 2007

 Reference Citations in 2006

 Reference Citations in 2005

 Reference Citations in 2004

 Reference Citations in 2003

 PDF Printing Version