Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm
Title | Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Aufa, F. J., Endroyono, Affandi, A. |
Conference Name | 2018 4th International Conference on Science and Technology (ICST) |
Keywords | and Adleman algorithm, Asymmetric Encryption, asymmetric keys, authentication, combination method, Communication networks, composability, compositionality, Data security, decryption process, digital signature, digital signature algorithm, Digital Signature Standard, digital signatures, DSA, DSA 512, DSA algorithms, DSS, Encryption, encryption process, Human Behavior, information, information and communication systems, Metrics, pubcrawl, Public key, public key cryptography, public key cryptography system, resilience, Resiliency, Rivest, RSA, RSA 1024, RSA algorithm, RSA encryption, Scalability, security, security system analysis, Shamir |
Abstract | Public key cryptography or asymmetric keys are widely used in the implementation of data security on information and communication systems. The RSA algorithm (Rivest, Shamir, and Adleman) is one of the most popular and widely used public key cryptography because of its less complexity. RSA has two main functions namely the process of encryption and decryption process. Digital Signature Algorithm (DSA) is a digital signature algorithm that serves as the standard of Digital Signature Standard (DSS). DSA is also included in the public key cryptography system. DSA has two main functions of creating digital signatures and checking the validity of digital signatures. In this paper, the authors compare the computational times of RSA and DSA with some bits and choose which bits are better used. Then combine both RSA and DSA algorithms to improve data security. From the simulation results, the authors chose RSA 1024 for the encryption process and added digital signatures using DSA 512, so the messages sent are not only encrypted but also have digital signatures for the data authentication process. |
DOI | 10.1109/ICSTC.2018.8528584 |
Citation Key | aufa_security_2018 |
- Resiliency
- Human behavior
- information
- information and communication systems
- Metrics
- pubcrawl
- Public key
- public key cryptography
- public key cryptography system
- resilience
- encryption process
- Rivest
- RSA
- RSA 1024
- RSA algorithm
- RSA encryption
- Scalability
- security
- security system analysis
- Shamir
- digital signature
- Asymmetric Encryption
- asymmetric keys
- authentication
- combination method
- Communication networks
- composability
- Compositionality
- Data Security
- decryption process
- and Adleman algorithm
- digital signatures
- digital signature algorithm
- Digital Signature Standard
- DSA
- DSA 512
- DSA algorithms
- DSS
- encryption