Implementasi Algoritma Keccak dan Elliptic Curve Digital Signature Untuk Tanda Tangan Digital

Priambodo, Rifky Daffa (2021) Implementasi Algoritma Keccak dan Elliptic Curve Digital Signature Untuk Tanda Tangan Digital. Undergraduate thesis, Institut Teknologi Sepuluh Nopember.

[thumbnail of 06111740000066-Undergraduate_Thesis.pdf] Text
06111740000066-Undergraduate_Thesis.pdf - Accepted Version
Restricted to Repository staff only until 1 October 2023.

Download (1MB) | Request a copy

Abstract

Pertukaran data melalui internet memiliki peran yang penting, terutama pada masa pandemi. Banyaknya hacker mengharuskan adanya sistem keamanan untuk menjaga proses transmisi data. Salah satu elemen penting dalam hal tersebut adalah menjaga integritas data. Integritas data berkaitan langsung dengan keaslian data dan kejelasan pengirim atau sumber data untuk meningkatkan kepercayaan pada data tersebut. Salah satu cara untuk menjaga integritas data adalah dengan menerapkan tanda tangan digital. Tanda tangan digital menggabungkan dua algoritma yaitu algoritma hashing untuk membuat hash dari data dan algoritma kriptografi asimetri untuk key generation, sign generation dan sign verification. Tugas akhir ini menggunakan Algoritma Keccak sebagai algoritma hashing dan Elliptic Curve Digital Signature Algorithm (ECDSA) sebagai algoritma kriptografi asimetri. Algortima Keccak merupakan algoritma hashing yang berbasis pada konstruksi spons dan permutasi terhadap state. Elliptic Curve Digital Signature Algorithm atau yang biasa disebut ECDSA adalah algoritma pembangkit tanda tangan digital yang berbasis pada Elliptic Curve Cryptography (ECC). Hasil uji coba menunjukkan bahwa implementasi dapat menjamin integritas data, autentikasi pengirim, dan non-repudiasi. Bedasarkan uji coba yang dilakukan didapatkan bahwa panjang kunci dapat mempengaruhi proses pembangkitan kunci dan ukuran tanda tangan digital yang dihasilkan, sedangkan ukuran file mempengaruhi proses penandatanganan serta verifikasi.
===============================================================================================
Data exchange via the internet have an important role, especially during the pandemic. Large amount of hackers requires a security system to maintain the data transmission process. One of the important elements in this regard is maintaining data integrity. Data integrity is directly related to the authenticity of the data and the clarity of the sender or data source. By maintaining the integrity of the data, trust will be built in the data. One way to maintain data integrity is to implement digital signatures. Digital signatures combine two algorithms, namely the hashing algorithm to create a hash of the data and the asymmetric cryptography algorithm for key generation, sign generation and sign verification. This final project use the Keccak Algorithm as a hashing algorithm and the Elliptic Curve Digital Signature Algorithm (ECDSA) as an asymmetric cryptographic algorithm. Keccak algorithm is a hashing algorithm based on sponge construction and state permutations. Elliptic Curve Digital Signature Algorithm or commonly called as ECDSA is a digital signature generator algorithm based on Elliptic Curve Cryptography (ECC). The test results show that the implementation can guarantee data integrity, sender authentication and non-repudiation. Based on the experiments conducted, it was found that the length of the key can affects the key generation process and the size of the digital signature generated. The file size affects the signing and verification process.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Pertukaran Data, Integritas, Tanda Tangan Digital, Keccak, ECDSA, Data Exchange, Integrity, Digital Signature, Keccak, ECDSA
Subjects: Q Science > QA Mathematics > QA76.9.A25 Computer security. Digital forensic. Data encryption (Computer science)
Divisions: Faculty of Science and Data Analytics (SCIENTICS) > Mathematics > 44201-(S1) Undergraduate Thesis
Depositing User: Rifky Daffa Priambodo
Date Deposited: 25 Aug 2021 16:25
Last Modified: 25 Aug 2021 16:25
URI: http://repository.its.ac.id/id/eprint/89692

Actions (login required)

View Item View Item