Transparent Peer Review By Scholar9
A Comparative Study of Digital Signature Algorithms
Abstract
The Digital signatures are an essential component to contemporary cryptographic security because they offer non-repudiation, data integrity, and authenticity for the transactions that are conducted online. This research offers a comparative study of three widely used digital signature algorithms:- EdDSA (Edwards-Curve Digital Signature Algorithm), ECDSA (Elliptic Curve Digital Signature Algorithm), and RSA (Rivest-Shamir-Adleman). We evaluated these algorithms on several parameters, such as computing effectiveness, security toughness, required key size, and practical implementation considerations.
Murali Mohana Krishna Dandu Reviewer
30 Sep 2024 12:07 PM
Approved
Relevance and Originality:
The research focuses on an essential aspect of modern cybersecurity—digital signatures. Given the increasing reliance on online transactions and data security, this comparative study is highly relevant. The originality of the research lies in its examination of three prominent digital signature algorithms—EdDSA, ECDSA, and RSA—providing a comparative analysis that could help practitioners make informed decisions based on the specific needs of their applications.
Methodology:
The methodology appears appropriate for a comparative study; however, it would benefit from greater detail. Specifically, explaining how each algorithm was evaluated—such as the specific metrics used for computing effectiveness and security toughness, the testing environments, and the criteria for practical implementation considerations—would enhance the clarity and rigor of the research.
Validity & Reliability:
The study's validity is strengthened by focusing on established algorithms, which are widely recognized in the field. To improve reliability, it is essential to present empirical data or experimental results that demonstrate the performance of each algorithm across the evaluated parameters. Additionally, addressing any potential limitations or biases in the comparison process would enhance the overall credibility of the findings.
Clarity and Structure:
The introduction provides a good overview of the significance of digital signatures and the scope of the research. However, the structure could be improved by clearly delineating sections for each algorithm being analyzed, including their characteristics, advantages, and disadvantages. This organization would make it easier for readers to follow the comparative analysis and understand the distinctions between the algorithms.
Results and Analysis:
The research mentions evaluating the algorithms on various parameters, but it lacks specific results or detailed analysis. Presenting quantitative findings—such as performance metrics related to computing effectiveness, security levels, and key sizes—would provide concrete evidence to support the conclusions drawn. Additionally, a critical discussion interpreting these results in the context of current practices in digital security would significantly enhance the paper's contribution to the field.
IJ Publication Publisher
Thank you
Murali Mohana Krishna Dandu Reviewer