E. H. Rachmawanto, L. Budi Handoko, Chaerul Umam, Cahaya Jatmoko, R. R. Ali
{"title":"Triple DES Cryptography Based on Hash Function and DSA for Digital Certificate Authentication","authors":"E. H. Rachmawanto, L. Budi Handoko, Chaerul Umam, Cahaya Jatmoko, R. R. Ali","doi":"10.1109/iSemantic55962.2022.9920438","DOIUrl":null,"url":null,"abstract":"Digital certificates are digital files that are conventionally used as proof of participation or a sign of appreciation owned by someone. Cryptographic authentication method using digital signatures that are used as confidential evidence and validation of digital certificate ownership. Digital signatures use cryptographic algorithms such as one-way hashes, non-symmetric key cryptography, and symmetric key cryptography. So this study uses the proposed algorithm used, namely SHA-256, DSA & 3DES. The SHA-256 algorithm is used because of its high security, while the DSA algorithm is a special standard for digital signatures with 2 (two) functions, namely signing & verifying, and the last is the 3DES algorithm as double security which guarantees 3 (three) times the encryption process and description. By implementing a digital signature using the SHA256 hash method, the DSA signing & verifying method, and the 3DES cryptographic algorithm, digital certificates can avoid editing threats, and ensure authentication security and validation of the validity of the file, so that it can detect the original digital certificate. In 10 experiments, it is known that the digital signature method with the SHA-256, DSA and 3DES algorithms has an average run time speed of 0.0518186331 seconds for the signing method and 0.1321175146 seconds for the verify method.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iSemantic55962.2022.9920438","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Digital certificates are digital files that are conventionally used as proof of participation or a sign of appreciation owned by someone. Cryptographic authentication method using digital signatures that are used as confidential evidence and validation of digital certificate ownership. Digital signatures use cryptographic algorithms such as one-way hashes, non-symmetric key cryptography, and symmetric key cryptography. So this study uses the proposed algorithm used, namely SHA-256, DSA & 3DES. The SHA-256 algorithm is used because of its high security, while the DSA algorithm is a special standard for digital signatures with 2 (two) functions, namely signing & verifying, and the last is the 3DES algorithm as double security which guarantees 3 (three) times the encryption process and description. By implementing a digital signature using the SHA256 hash method, the DSA signing & verifying method, and the 3DES cryptographic algorithm, digital certificates can avoid editing threats, and ensure authentication security and validation of the validity of the file, so that it can detect the original digital certificate. In 10 experiments, it is known that the digital signature method with the SHA-256, DSA and 3DES algorithms has an average run time speed of 0.0518186331 seconds for the signing method and 0.1321175146 seconds for the verify method.