The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018 4th International Conference on Science and Technology (ICST) 2018
DOI: 10.1109/icstc.2018.8528584
|View full text |Cite
|
Sign up to set email alerts
|

Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(16 citation statements)
references
References 4 publications
0
7
0
2
Order By: Relevance
“…Pemfaktoran dilakukan untuk memperoleh kunci privat (Sumarno et al, 2018). Algoritma RSA memiliki 3 proses penting: key generation, encryption, dan decryption (Aufa, Endroyono, & Affandi, 2018).…”
Section: Survei Literaturunclassified
See 1 more Smart Citation
“…Pemfaktoran dilakukan untuk memperoleh kunci privat (Sumarno et al, 2018). Algoritma RSA memiliki 3 proses penting: key generation, encryption, dan decryption (Aufa, Endroyono, & Affandi, 2018).…”
Section: Survei Literaturunclassified
“…Menurut Mitali and Sharma bahwa kelemahan utama dari algoritma RSA adalah pemrosesan yang lambat. Metode kombinasi RSA 1024 dan DSA 512 untuk mendapatkan waktu komputasi yang relatif cepat (Aufa et al, 2018). Metode kombinasi ini tidak hanya dapat mengenkripsi pesan, tetapi juga menyediakan tanda tangan digital untuk proses otentikasi dengan aman dan cepat (Aufa et al, 2018).…”
Section: Perkembangan Kriptografi Asimetrisunclassified
“…Cryptography is the science of hidden writing which is encryption and decryption text and messages. [2] Cryptography divided into two significant operations: encryption and decryption. The encryption process is the converting of plain text (original message) into ciphertext (hidden message) that can't be read by an authorized user [1,3].…”
Section: Literature Studymentioning
confidence: 99%
“…On other hands the public key and private key used in the asymmetric. symmetric key defined as public-key cryptography [2]. The Asymmetric keys utilize pair of keys the first is a hidden key while the second one is a public key.…”
Section: Literature Studymentioning
confidence: 99%
“…Besides, this algorithm is also used for the signature. To create the signing, we apply the private key while we use the public key to verify the authenticity of the signing to ensure the message's integrity [20]. d) Advanced encryption standard (AES) with secure hash function (SHA) AES is a block cipher standard published by the National Institute of Standard and Technology (NIST) and has become one of the most popular symmetric encryption algorithms [21].…”
Section: Introductionmentioning
confidence: 99%