Abstract
The digital signature generation process begins with the creation of a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document. At present, in the very fast development of information technology, quantum computers have emerged the ability to solve very large and complex amounts of data calculated by qubits, which when compared to quantum computers can work 10 minutes to work on a process that takes 1025 years on a computer. Therefore, the research focuses on how electronic signatures on documents have a reliable security system. The Digital Signature Algorithm (DSA) is a key algorithm used for digital signatures, which uses the Secure Hash Algorithm (SHA-1) to convert messages into message digest and parameters based on the ElGamal signature algorithm. The author also shows an example of digital signature encryption and decryption process by taking any numbers p = 59419 and q = 3301 to prove that the message can be formed and verified its authenticity.
Publisher
Raden Intan State Islamic University of Lampung
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Digital Signature Chain for Security and Integrity Data Transmission;2023 IEEE 9th International Conference on Computing, Engineering and Design (ICCED);2023-11-07
2. Text-based File Security with Signcryption Using AAβ and DSA Algorithms;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22