Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm

Farah Jihan Aufa, Endroyono, Achmad Affandi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

37 Citations (Scopus)

Abstract

Public key cryptography or asymmetric keys are widely used in the implementation of data security on information and communication systems. The RSA algorithm (Rivest, Shamir, and Adleman) is one of the most popular and widely used public key cryptography because of its less complexity. RSA has two main functions namely the process of encryption and decryption process. Digital Signature Algorithm (DSA) is a digital signature algorithm that serves as the standard of Digital Signature Standard (DSS). DSA is also included in the public key cryptography system. DSA has two main functions of creating digital signatures and checking the validity of digital signatures. In this paper, the authors compare the computational times of RSA and DSA with some bits and choose which bits are better used. Then combine both RSA and DSA algorithms to improve data security. From the simulation results, the authors chose RSA 1024 for the encryption process and added digital signatures using DSA 512, so the messages sent are not only encrypted but also have digital signatures for the data authentication process.

Original languageEnglish
Title of host publicationProceedings - 2018 4th International Conference on Science and Technology, ICST 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538658130
DOIs
Publication statusPublished - 8 Nov 2018
Event4th International Conference on Science and Technology, ICST 2018 - Yogyakarta, Indonesia
Duration: 7 Aug 20188 Aug 2018

Publication series

NameProceedings - 2018 4th International Conference on Science and Technology, ICST 2018

Conference

Conference4th International Conference on Science and Technology, ICST 2018
Country/TerritoryIndonesia
CityYogyakarta
Period7/08/188/08/18

Keywords

  • DSA
  • Digital Signature
  • RSA
  • encryption
  • security

Fingerprint

Dive into the research topics of 'Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm'. Together they form a unique fingerprint.

Cite this