International Journal of Computer Applications (0975 8887) Volume 117 No. 16, May 2015 1 Survey on Techniques Developed using Digital Signature: Public key Cryptography Shivendra Singh Student Department of CSE Amity University, Noida, India Md. Sarfaraz Iqbal Student Department of CSE Amity University, Noida, India Arunima Jaiswal Asst. Professor Department of CSE Amity University, Noida, India ABSTRACT The digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the originator's identity. Digital signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. This architecture is related with secure Hash Function and cryptographic algorithm In this paper we are going to make review about all those technique that are developed within last 5-10 years. And which are developed with the help of digital signature and based on public key cryptography. These techniques provides a better platform for security of data using cryptography. General Terms Safety, Key, Hiding, Symmetric, Signature, Stream, Block, Security, Algorithms. Keywords Digital Signature, Public key Cryptography, Block cipher, MD5, Security arguments, XML signatures, DSA, HEC, GPS, Geo-encryption. 1. INTRODUCTION Now a days a lot of information go through the internet using different means. Some of the information are highly confidential and we cannot compromise with its security. So we use lot of different techniques and algorithms to make our data as secure as much as possible. And these techniques and algorithms are collectively called as Cryptography. There are lots of techniques comes under it. One of the important technique is Digital Signature which helps in assuring that the info provider and information provided both are genuine. This provide a better security level to the transfer of information over a network. Using this important technique of cryptography lots of other derived techniques are developed based on public key cryptography. 2. DIGITAL SIGNATURE 2.1 Overview A digital signature is a mathematical technique that is generally used know whether a document or information is authenticated or not. In this technique a digital signature is generated as a valid reason for recipient to believe that this document or information is send only by the authorized sender. And it also assure that the message is not altered during the transfer over the network. This technique generally deals in software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering. 2.2 Application THERE ARE SOME COMMON REASONS FOR APPLYING A DIGITAL SIGNATURE TO COMMUNICATIONS: Authentication:- Digital signature is used to identify the ownership information and content authentication using different cryptography algorithms Integrity:- Since only one digital signature can be created for each unique message for any sender therefore it can be effectively used to verify authenticity of sender and therefore the integrity of message. Non-repudiation:- Since the same signature is generated on the both side of transmission to authenticate the data, it is clear that the sender cannot deny that the information is send by him/her. 3. LITERATURE SURVEY The last 1 or 1.5 decades have seen a lot of researches in field of digital signature in which lots of derived techniques are originated and applied in the security field. Studies carried out in Literature Survey:- Pointchevala et al [2000] [1] provides some security arguments for digital signature as well as for blind signature. Here anyone can justify realistic parameters even if they are not optimal. Gerić et al (2012) [2] provides information about XML sigantures. XML signatures are type of digital signatures generally helps in XML Transactions. It also defines a particular schema for the storage of XML data’s result based on digital signature operations. Nguyen et al (2011) [3] presented a paper on functionality Extension of the Digital Signature Standards. The protocol used here is based on Belarusian DS standards which are flexible and provide a possibility of natural extension of their functionality. Zhang et al (2011) [4] makes an improvement on digital signature algorithm which is based on elliptic curve cryptography. In this paper he obtained a new digital signature scheme by improving the original digital signature based on elliptic curve cryptosystem. Xuan et al (2009) [5] makes a research on the comparison of algorithms used by Digital signature in Mobile Web world. DSA, RSA and ECDSA are some algorithms which are generally used in comparison in this paper. Jian-zhi et al (2009) [6] gives a design of Hyper Elliptic Curve Digital Signature in which they described DSA and HEC algorithms to combine them and to generate DSA-HEC