@inproceedings{7d012c224da64158b4555657b9358a3c,
title = "Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm",
abstract = "Public key cryptography or asymmetric keys are widely used in the implementation of data security on information and communication systems. The RSA algorithm (Rivest, Shamir, and Adleman) is one of the most popular and widely used public key cryptography because of its less complexity. RSA has two main functions namely the process of encryption and decryption process. Digital Signature Algorithm (DSA) is a digital signature algorithm that serves as the standard of Digital Signature Standard (DSS). DSA is also included in the public key cryptography system. DSA has two main functions of creating digital signatures and checking the validity of digital signatures. In this paper, the authors compare the computational times of RSA and DSA with some bits and choose which bits are better used. Then combine both RSA and DSA algorithms to improve data security. From the simulation results, the authors chose RSA 1024 for the encryption process and added digital signatures using DSA 512, so the messages sent are not only encrypted but also have digital signatures for the data authentication process.",
keywords = "DSA, Digital Signature, RSA, encryption, security",
author = "Aufa, {Farah Jihan} and Endroyono and Achmad Affandi",
note = "Publisher Copyright: {\textcopyright} 2018 IEEE.; 4th International Conference on Science and Technology, ICST 2018 ; Conference date: 07-08-2018 Through 08-08-2018",
year = "2018",
month = nov,
day = "8",
doi = "10.1109/ICSTC.2018.8528584",
language = "English",
series = "Proceedings - 2018 4th International Conference on Science and Technology, ICST 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "Proceedings - 2018 4th International Conference on Science and Technology, ICST 2018",
address = "United States",
}