A digital document tracker on a file storage system uses a combination of the SHA3-512 and RSA algorithms to safeguard the authenticity of document data

Authors

  • asep rizal nurjaman ITENAS

DOI:

https://doi.org/10.33197/jitter.vol10.iss3.2024.2200

Keywords:

Digital signature, SHA3-512, RSA algorithm

Abstract

The aim of this research is to analyze the security
of digital signature schemes, so that the integrity of
the data in the signature document is better
maintained and the recipient is trusted to have come
from a legitimate sender. The rapid development of
technology today means that all signed physical
documents have turned into softfile documents with
digital signatures. The process of creating a digital
signature begins with creating a public key and a
private key. A public key is generated and published
to verify the signature and calculate the hash value of
the received document. Several studies have used the
concept of algorithms in cryptography, namely the
RSA cryptographic algorithm, but it still has
shortcomings in that it cannot be proven whether the
document received by the recipient is a document
from a legitimate sender and there have been no
changes to the document. In this research the author
tries to perfect previous research where users can
validate the authenticity of documents and believe
that the sender of the document is a legitimate sender
with a combination of the RSA and SHA3-512
algorithms. The document used in this research has
.pdf extension. Mitm attack testing resulted in the
conclusion that the strength of the secret key was the
basis for the scheme being built. The digital signature
scheme that is built can validate the authenticity of
documents received by the recipient and prove that
the document was sent by a legitimate sender. Time
for document validation and signature depends on the
size of the uploaded pdf file

Downloads

Download data is not yet available.

Published

2024-08-18

How to Cite

[1]
asep rizal nurjaman, “A digital document tracker on a file storage system uses a combination of the SHA3-512 and RSA algorithms to safeguard the authenticity of document data”, jitter, vol. 10, no. 3, Aug. 2024.

Issue

Section

Articles