IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (Jul 2019)

Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)

  • Muhammad Asghar Nazal,
  • Reza Pulungan,
  • Mardhani Riasetiawan

DOI
https://doi.org/10.22146/ijccs.47267
Journal volume & issue
Vol. 13, no. 3
pp. 273 – 282

Abstract

Read online

Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect. One of the developments made by the G-Connect project is about data security; most of the problems verification of the data sent. In previous studies, Keccak and RSA algorithms have implemented for data verification needs. But after a literature study of other algorithms that can make digital signatures, we found what is meant by an algorithm that is better than RSA in rectangular speeds, namely Digital Signature Algorithm (DSA). DSA is one of the key algorithms used for digital signatures, but because DSA still uses Secure Hash Algorithm (SHA-1) as an algorithm for hashes, DSA rarely used for data security purposes, so Keccak is used instead of the hash algorithm on DSA. Now, Keccak become the standard for the new SHA-3 hash function algorithm. Because of the above problems, the focus of this research is about data verification using Keccak and DSA. The results of the research are proven that Keccak can run on DSA work system, obtained a comparison of execution time process between DSA and RSA where both use Keccak.

Keywords