B. Sinaga, Muhammad Abdul Rohim, Efori Bu’ulolo
{"title":"Implementasi MD5 dan Paillier Cryptosystem Untuk Membuat Tanda Tangan Digital","authors":"B. Sinaga, Muhammad Abdul Rohim, Efori Bu’ulolo","doi":"10.30865/resolusi.v2i5.331","DOIUrl":null,"url":null,"abstract":"Of the several benefits of cryptographic techniques is data authentication. Before the digital era, signatures were used as a means to prove the authenticity of printed documents such as letters, certificates, certificates, books and so on. Documents that do not have a signature will be doubtful for their authenticity. One of the characteristics of these signatures is that all the signature patterns are the same, so this situation can easily be manipulated with signature forgery, if the related parties use a different signature on each document that is signed it will also have an impact on changing doubts on the parties who are signed. reserves the right to verify. To overcome the need, documents should be given a digital signature. The intended digital signature is not a manual signature that is scanned and then embedded in a digital document. Digital signatures will be built from cryptographic techniques. In this study, the signature that will be used is a signature with a combination of a hash function algorithm and a web-based public-key cryptography. The methods used are the MD5 algorithm and Paillier Cryptosystem. Paillier cryposystem is a public-key cryptographic algorithm which is believed to be difficult to attack because it uses n-residue class calculations so that it will be very difficult to find the key pair used, this is known as the Composite Residuosity (CR) assumption.","PeriodicalId":115863,"journal":{"name":"Resolusi : Rekayasa Teknik Informatika dan Informasi","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Resolusi : Rekayasa Teknik Informatika dan Informasi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30865/resolusi.v2i5.331","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

加密技术的几个好处之一是数据身份验证。在数字时代之前,签名被用作证明信件、证书、证书、书籍等印刷文件真实性的手段。没有签名的文件的真实性值得怀疑。这些签名的特征之一是所有的签名模式都是相同的,所以这种情况很容易被签名伪造操纵,如果相关方在每个签名的文件上使用不同的签名,它也会对被签名方的怀疑产生影响。保留核实的权利。为了克服这一需求,文件应该被赋予数字签名。预期的数字签名不是扫描后嵌入到数字文档中的手动签名。数字签名将从密码学技术构建。在本研究中,将使用的签名是结合了哈希函数算法和基于web的公钥加密的签名。使用的方法是MD5算法和Paillier密码系统。Paillier密码系统是一种难以攻击的公钥加密算法,因为它使用n-残差类计算,因此很难找到使用的密钥对,这被称为复合残差(CR)假设。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Implementasi MD5 dan Paillier Cryptosystem Untuk Membuat Tanda Tangan Digital
Of the several benefits of cryptographic techniques is data authentication. Before the digital era, signatures were used as a means to prove the authenticity of printed documents such as letters, certificates, certificates, books and so on. Documents that do not have a signature will be doubtful for their authenticity. One of the characteristics of these signatures is that all the signature patterns are the same, so this situation can easily be manipulated with signature forgery, if the related parties use a different signature on each document that is signed it will also have an impact on changing doubts on the parties who are signed. reserves the right to verify. To overcome the need, documents should be given a digital signature. The intended digital signature is not a manual signature that is scanned and then embedded in a digital document. Digital signatures will be built from cryptographic techniques. In this study, the signature that will be used is a signature with a combination of a hash function algorithm and a web-based public-key cryptography. The methods used are the MD5 algorithm and Paillier Cryptosystem. Paillier cryposystem is a public-key cryptographic algorithm which is believed to be difficult to attack because it uses n-residue class calculations so that it will be very difficult to find the key pair used, this is known as the Composite Residuosity (CR) assumption.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信