Visible to the public Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm

TitleSecurity System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm
Publication TypeConference Paper
Year of Publication2018
AuthorsAufa, F. J., Endroyono, Affandi, A.
Conference Name2018 4th International Conference on Science and Technology (ICST)
Keywordsand Adleman algorithm, Asymmetric Encryption, asymmetric keys, authentication, combination method, Communication networks, composability, compositionality, Data security, decryption process, digital signature, digital signature algorithm, Digital Signature Standard, digital signatures, DSA, DSA 512, DSA algorithms, DSS, Encryption, encryption process, Human Behavior, information, information and communication systems, Metrics, pubcrawl, Public key, public key cryptography, public key cryptography system, resilience, Resiliency, Rivest, RSA, RSA 1024, RSA algorithm, RSA encryption, Scalability, security, security system analysis, Shamir
Abstract

Public key cryptography or asymmetric keys are widely used in the implementation of data security on information and communication systems. The RSA algorithm (Rivest, Shamir, and Adleman) is one of the most popular and widely used public key cryptography because of its less complexity. RSA has two main functions namely the process of encryption and decryption process. Digital Signature Algorithm (DSA) is a digital signature algorithm that serves as the standard of Digital Signature Standard (DSS). DSA is also included in the public key cryptography system. DSA has two main functions of creating digital signatures and checking the validity of digital signatures. In this paper, the authors compare the computational times of RSA and DSA with some bits and choose which bits are better used. Then combine both RSA and DSA algorithms to improve data security. From the simulation results, the authors chose RSA 1024 for the encryption process and added digital signatures using DSA 512, so the messages sent are not only encrypted but also have digital signatures for the data authentication process.

DOI10.1109/ICSTC.2018.8528584
Citation Keyaufa_security_2018