Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA)
Abstract
The digital signature generation process begins with the creation of a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document. At present, in the very fast development of information technology, quantum computers have emerged the ability to solve very large and complex amounts of data calculated by qubits, which when compared to quantum computers can work 10 minutes to work on a process that takes 1025 years on a computer. Therefore, the research focuses on how electronic signatures on documents have a reliable security system. The Digital Signature Algorithm (DSA) is a key algorithm used for digital signatures, which uses the Secure Hash Algorithm (SHA-1) to convert messages into message digest and parameters based on the ElGamal signature algorithm. The author also shows an example of digital signature encryption and decryption process by taking any numbers p = 59419 and q = 3301 to prove that the message can be formed and verified its authenticity.
Keywords
Full Text:
PDFReferences
A. Nugraha and A. Mahardika, “Penerapan tanda tangan elektronik pada sistemelektronik pemerintahan guna mendukung e-government,” in Seminar Nasional Sistem Informasi Indonesia, 2016.
Y. Yoo, R. Azarderakhsh, A. Jalali, D. Jao, and V. Soukharev, “A post-quantum digital signature scheme based on supersingular isogenies,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2017, vol. 10322 LNCS, pp. 163–181, doi: 10.1007/978-3-319-70972-7_9.
Y. Huang, F. Zhang, Z. Liu, and H. Zhang, “An efficient signature scheme from supersingular elliptic curve isogenies,” IEEE Access, vol. 7, no. 1, pp. 129834–129847, 2019, doi: 10.1109/ACCESS.2019.2938682.
L. De Feo, “Mathematics of Isogeny Based Cryptography,” Thiès, Nov. 2017.
M. A. Nazal, R. Pulungan, and M. Riasetiawan, “Data integrity and security using keccak and digital signature algorithm (DSA),” IJCCS (Indonesian J. Comput. Cybern. Syst., vol. 13, no. 3, p. 273, Jul. 2019, doi: 10.22146/ijccs.47267.
A. Saepulrohman, A. Denih, and A. Talib Bon, “Elliptic curve Diffie-Hellman cryptosystem for public exchange process,” in The 5th NA International Conference on Industrial Engineering and Operations Management, 2020, pp. 1–6.
A. Saepulrohman and T. P. Negara, “Implementation of elliptic curve diffie-hellman (ECDH) for encoding messeges becomes a point on the GF(í µí2í µí2) 1*,” Int. J. Adv. Sci. Technol., vol. 29, no. 6, pp. 3264–3273, May 2020.
M. B. Yassein, S. Aljawarneh, E. Qawasmeh, W. Mardini, and Y. Khamayseh, “Comprehensive study of symmetric key and asymmetric key encryption algorithms,” in Proceedings of 2017 International Conference on Engineering and Technology, ICET 2017, 2018, vol. 2018-January, pp. 1–7, doi: 10.1109/ICEngTechnol.2017.8308215.
F. Nurhasanah and R. Sulaiman, “Pembuatan tanda tangan digital menggunakan digital signature algorithm,” Mathunesa J. Ilm. Mat., vol. 2, no. 2, pp. 1–7, May 2013.
B. R. Pajčin and P. N. Ivanis, “Analysis of software realized DSA algorithm for digital signature,” Electronics, vol. 15, no. 2, pp. 73–78, 2011.
A. Supriyanto, “Pemakaian kriptografi kunci publik untuk proses enkripsi dan tandatangan digital pada dokumen e-mail,” Din. Inform., vol. 1, no. 1, pp. 14–19, 2019.
A. Mali, C. Mahalle, M. Kulkarni, T. Nangude, and P. G. Navale, “Digital signature authentication and verification on smartphones using CRPT algorithm,” Int. Res. J. Eng. Technol., vol. 4, no. 5, pp. 332–338, 2017.
D. K. Black, “The digital signature standard: Overview and current status,” Comput. Secur., vol. 12, no. 5, pp. 437–446, Aug. 1993, doi: 10.1016/0167-4048(93)90062-A.
S. Kazmirchuk, A. Ilyenko, S. Ilyenko, O. Prokopenko, and Y. Mazur, “The Improvement of digital signature algorithm based on elliptic curve cryptography,” in Advances in Intelligent Systems and Computing, 2021, vol. 1247 AISC, pp. 327–337, doi: 10.1007/978-3-030-55506-1_30.
A. Sajjad, M. Afzal, M. M. W. Iqbal, H. Abbas, R. Latif, and R. A. Raza, “Kleptographic attack on elliptic curve based cryptographic protocols,” IEEE Access, vol. 8, pp. 139903–139917, 2020, doi: 10.1109/ACCESS.2020.3012823.
DOI: http://dx.doi.org/10.24042/ijecs.v1i1.7923
Refbacks
- There are currently no refbacks.
International Journal of Electronics and Communications System (IJECS) is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.