2019
DOI: 10.22146/ijccs.47267
|View full text |Cite
|
Sign up to set email alerts
|

Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)

Abstract: Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect. One of the developments made by the G-Connect project is about data security; most of the problems verification of the data sent. In previous studies, Keccak and RSA algorithms have implemented for data verification needs. But after a literature study of other algorithms that can make digital signatures, we found what is meant by an algorithm th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
1
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 5 publications
0
1
0
2
Order By: Relevance
“…Penelitian sebelumnya mengenai tanda tangan digital pada "Authentication System for E-Certificate by Using RSA's Digital Signature" [4] menunjukkan bahwa proses penandatanganan dan pengecekan diselesaikan dengan cepat ketika aplikasi penandatanganan diterapkan dengan Chinese Remainder Theorem (CRT). Selanjutnya pada "Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)" [5] menunjukkan bahwa algoritma Keccak dapat diterapkan pada sistem DSA, serta diperoleh perbandingan waktu eksekusi proses signing dan verifying antara DSA dan RSA ketika menggunakan algoritma Keccak.…”
Section: Pendahuluanunclassified
“…Penelitian sebelumnya mengenai tanda tangan digital pada "Authentication System for E-Certificate by Using RSA's Digital Signature" [4] menunjukkan bahwa proses penandatanganan dan pengecekan diselesaikan dengan cepat ketika aplikasi penandatanganan diterapkan dengan Chinese Remainder Theorem (CRT). Selanjutnya pada "Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)" [5] menunjukkan bahwa algoritma Keccak dapat diterapkan pada sistem DSA, serta diperoleh perbandingan waktu eksekusi proses signing dan verifying antara DSA dan RSA ketika menggunakan algoritma Keccak.…”
Section: Pendahuluanunclassified
“…Algoritma SHA-512 cukup handal dan aman ketika mengenkripsi gambar, sensitivitas gambar, dan tahan terhadap serangan kriptanalitik [11]. Secure Hash Algorithm (SHA-1) bahkan digunakan untuk mengenkripsi tanda tangan digital Digital Signature Algorithm (DSA) [12]. Selain digunakan untuk mengenkripsi tanda tangan digital atau DSA, Secure Hash Algoritma (SHA-3) dapat digunakan untuk arsitektur perangkat keras yaitu processor Nios II pada FPGA Arria 10 GX [13].…”
Section: Pendahuluanunclassified
“…The following are some of the main literature on which the theory is based, namely: the application of digital signatures in government electronic systems to support e-government [1], a post-quantum digital signature scheme based on Supersingular Isogenies [2], an efficient signature scheme of Isogenies of Supersingular Elliptic Curves [3], and mathematical concepts and models based on Isogen-Based Cryptographic Mathematics [4]and data integrity and security using keccak and Digital Signature Algorithm (DSA) [5] and elliptic curve Diffie-Hellman cryptosystem for public exchange process [6], [7].…”
Section: Introductionmentioning
confidence: 99%