AES (Advanced Encryption Standard) and RSA (Rivest Shamir Adleman) Encryption on Digital Signature Document : A Literature Review
Watermarking, Digital Signature, AES, RSA, Literature Review
DOI:
https://doi.org/10.24246/ijiteb.712022.29-31Keywords:
AES, Digital Signature, Literature Review, RSA, WatermarkingAbstract
Distributed digital documents, it can utilize cryptographic methods to provide confidentiality, data integrity, authentication and non repudiation services. Watermark in this case serves as authentic proof of ownership of the data or document, and its existence should not damage or change the contents or counter of digital data or digital documents. The RSA and AES encryption methods in digital signatures are appropriate to be taken as a reliable method. But a unique biometric key idea emerged, one of which was used to authenticate users.
Downloads
References
A. S. Leonardo Refialy, Eko Sediyono, “Pengamanan Sertifikat Tanah Digital Menggunakan Digital Signature SHA-512 dan,” J. Tek. Inform. dan Sist. Inf., vol. 1, pp. 229–234, 2015.
A. S. Sukarno, “Pengembangan Aplikasi Pengamanan Dokumen Digital Memanfaatkan Algoritma Advance Encryption Standard , RSA Digital Signature dan Invisible Watermarking,” Lemb. Sandi Negara Jakarta, pp. 1–8, 2013.
and S. V. P. V. R. Pallipamu, T. R. K, “Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm,” Int. J. Emerg. Technol. Adv. Eng., vol. 4, no. 6, pp. 609–613, 2014.
B. Schneier, “Applied Cryptography – Protokol, Algorithms and Source Code in C,” John Wiley Sons, 1996.
C. Rsa, R. D. Ardy, O. R. Indriani, C. A. Sari, D. R. Ignatius, and M. Setiadi, “Digital Image Signature using Triple Protection Cryptosystem (RSA, Vigenere, and MD5),” pp. 87–92, 2017.
E. Rahmawati, M. Listyasari, A. S. Aziz, S. Sukaridhoto, and F. A. Damastuti, “Digital Signature On File Using Biometric Fingerprint With Fingerprint Sensor On Smartphone,” pp. 234–238, 2017.
M. A. B. and S. A.-N. Y. A. Nasser, “AES algorithm implementation for a simple low cost portable 8-bit microcontroller,” 2016 Sixth Int. Conf. Digit. Inf. Process. Commun., pp. 203–207, 2016.
M. Yusuf and T. Rohman, “Implementasi Group Blind Digital Signature Dalam Sistem E-Voting Pemilihan Kepala Daerah,” Semin. Nas. Inform., vol. 2012, no. semnasIF, pp. 75–81, 2012.
Noroozi, E., Daud, S. M. & Sabouhi, A. 2014. Enhancing Secured Data Hiding Using Dynamic Digital Signature for Authentication Purpose. Jurnal Teknologi 68.
P. S. and S. S. G. S. Mewada, “Exploration of efficient symmetric AES algorithm,” 2016 Symp. Colossal Data Anal. Netw., pp. 1–5, 2016.
P. S. Lozhnikov and A. E. Sulavko, “Implementation of Digital Signature Using Aes and Rsa Algorithms as a Security in Disposition System af Letter Implementation of Digital Signature Using Aes and Rsa Algorithms as a Security in Disposition System af Letter,” 2017.
P. Prakash dan P. Purohit, “An Efficient Implementation of PKI Architecture Based Digital Signature Using RSA and Various Hash Functions (MD5 and SHA Variants),” 2013.
R. Munir, “Kriptografi,” Bandung, Inform., 2006.
S. A. Jaju and S. S. Chowhan, "A Modified RSA algorithm to enhance security for digitalsignature," Computing and Communication (IEMCON), 2015 International Conference and Workshop on, Vancouver, BC, 2015, pp. 1-5.
S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric AES algorithm," 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, 2016, pp. 1- 5.
Z. Xiao, “Research and Implementation of Four-prime RSA Digital Signature Algorithm,” 2015.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 International Journal of Information Technology and Business

This work is licensed under a Creative Commons Attribution 4.0 International License.





