Digital Certificate Authentication With Three-Level Cryptography SHA-256 DSA 3DES
Digital Certificate Authentication With Three-Level Cryptography SHA-256 DSA 3DES
Abstract— The rapid development of technology, makes it Cryptographic methods in securing information such as
easier for everyone to exchange information and knowledge. digital certificates use authentication technology using digital
Exchange information via the internet is threatened with signatures [2], [5]. Digital signatures are used as proof of
security. Security issues, especially the issue of the confidentiality and validation of information ownership, in
confidentiality of information content and its authenticity, are this case, digital certificates. Digital signatures use
vital things that must protect. Peculiarly for agencies that often cryptographic algorithms such as one-way hash systems,
hold activities that provide certificates in digital form to non-symmetric key cryptography, and symmetric key
participants. Digital certificates are digital files conventionally cryptography [5], [6]. One of the universal and guaranteed
used as proof of participation or a sign of appreciation owned
one-way hash function methods is SHA-256. This function
by someone. We need a security technology for certificates as a
source of information known as cryptography. This study aims
was designed by the National Institute of Standards and
to validate and authenticate digital certificates with digital Technology (NIST) in 2002 to replace the old hash model
signatures using SHA-256, DSA, and 3DES. The use of the that had confidentiality flaws. Non-symmetric key
SHA-256 hash function is in line with the DSA method and the cryptography that is popular and has become the standard for
implementation of 3DES which uses 2 private keys so that the digital signature authentication by NIST is the Digital
security of digital certificate files can be increased. The pixel Signature Standard (DSS) with the algorithm used Digital
changes that appear in the MSE calculation have the lowest Signature Algorithm (DSA) [5]. The algorithm is made
value of 7.4510 and the highest value of 165.0561 when the file specifically for handling digital certificates that have the
is manipulated, it answers the security of the proposed method primary function of signing and verifying. The block-cipher
is maintained because the only valid file is the original file. 3DES algorithm is asymmetric key cryptography that
guarantees security by using three times the process of
Keywords— Digital Signature, SHA-256, DSA, 3DES encrypting and decrypting data [2], [7].
I. INTRODUCTION As a guarantee of security, the DSA algorithm is an
The rapid development of technology, accompanied by a algorithm specifically designed for digital signatures. It is
lot of support in surfing the internet, makes it easier for required to use a hash function. The hash function used by
everyone to exchange information and knowledge. The the DSA algorithm is SHA-128 which in this study improved
exchange of information uses many media such as by using the SHA-256 hash function that has a higher
smartphones, computers, and laptops. The information complexity. Meanwhile, DSA has a faster speed of 5 seconds
shared by users of these devices varies, such as sending e- compared to 0.1 seconds for the RSA signature algorithm
mails, sending messages on social media, etc. Sending [8], [9]. The addition of the 3DES block cipher algorithm as
information via the internet is threatened with security [1], an advanced level of security where the comparison of
[2]. It can be stopped, deflected, or changed the contents in it memory requirements, speed, and bandwidth, is superior
by parties who are not responsible. This action is illegal and because it has an average value state at the intermediate level
done to steal the information contained in it. compared to other algorithms [1], [10].
Security issues, especially the issue of the confidentiality From the explanation of the digital signature
of information content and its authenticity, are vital things authentication method and popular algorithms, this study
that must protect. Every agency that has anything to do with aims to validate and authenticate digital certificates with
digital files is very vulnerable to this problem. Peculiarly for digital signatures using SHA-256, DSA, and 3DES. So it can
agencies that often hold activities that provide certificates in guarantee data authorization, authentication, and non-
digital form to participants. Digital certificates are digital repudiation on digital certificates.
files conventionally used as proof of participation or a sign II. LITERATURE REVIEW
of appreciation owned by someone. Digital certificates are
very vulnerable to being manipulated by irresponsible A. SHA-256
parties. Proving the validity of fake digital documents and SHA-256 is a hash algorithm designed and developed by
certificates has been done for a long time, and some cannot. the National Institute of Standards and Technology (NIST) in
So we need a security technology for certificates as a source 2002. SHA-256 produces a message digest with a length of
of information known as cryptography [3], [4]. 256 bits. SHA-256 is classified as a security category
horized licensed use limited to: NUST School of Electrical Engineering and Computer Science (SEECS). Downloaded on September 28,2023 at 04:09:31 UTC from IEEE Xplore. Restrictions ap
978-1-6654-8839-6/22/$31.00 ©2022 IEEE 343
2022 International Seminar on Application for Technology of Information and Communication (iSemantic)
because it is designed to make it impossible to obtain other • Calculate each value on each schedule.
messages related to the same message digest. The message
digest generation process in this algorithm consists of five • For each message block, calculate the intermediate
steps: hash value.
1) Message Padding : Divide the message to produce 5) Finalization : All 512-bit m(n) blocks have
message blocks with a length of 512 bits. This results in the proceeded. The final result is a 256-bit message digest [11].
number of the last block is less than or equal to 512 bits. B. DSA
Perform message padding on the final block of messages DSA is an asymmetric key cryptography algorithm that
with the following steps: uses two keys, namely private and public keys. DSA was
a) The entered message has an ASCII value. Convert developed from the El-Gamal algorithm. DSA does not
the ASCII value into a series of binary number bits. function as message encryption but has 2 (two) main
b) Divide the series of bits into 512-bit blocks. The functions, namely as a message (signing) and authentication
division results in the number of blocks of the last value as a message validity (verify) [8], [9]. The signing process
being equal to or less than 512 bits. uses a key whereas the verification process uses the public
key. Before carrying out a process, the keys from the DSA
c) Add the contents of the bits in the last block of the are generated first [9]. The following are the stages and
message using bits 1 and 0 according to the required number parameters used in the DSA:
following these rules:
• The last block bit < 448 bits. Add bit 1 at the 1) DSA Parameters
beginning and add the remainder with bit 0 until the • Parameter p is a prime number with length L bits. The
number becomes 448 bits. length of L must be a multiple of 64 bits and fullfill
512 bits ≤ L ≤ 1024 bits. The parameter p is public.
• The last block bit ≥ 448 bits & < 512 bits. Add bit 1
at the beginning and add the remainder with bit 0 • Parameter q, prime factor of (p–1) thus fulfill (p–1)
until the number becomes 512 bits. mod q = 0. Parameter q has a length of 160 bits.
Parameter q is public.
• The last block bit = 512 bits. Create a new block with
the initial value of bit 1 and then bit 0 until the bit • g = h(p–1)/q mod p, with parameter value h<(p–1)
length becomes 448 bits. such that h(p–1)/q mod p > 1. Parameter g is public.
2) Addition of Bit Length : The number of bits in the • Parameter x is an integer that fulfills x < q, and this
last block of the message, 448 bits long, must be added to parameter is a private key.
make it 512 bits. By representing the message m into a • Parameter k is an integer that fulfills k < q , and this
binary number to get the remaining 64 bits. Set the order of parameter is a private key.
the rightmost bytes of the message (m) as low-order.
• Parameter y, calculated by the equation y = gx mod p,
3) Initialize Initial Hash Value : Initial and temporary
y is the public key parameter.
output value in the SHA-256 hash function use the buffer
values H0, H1, H2, H3, H4, H5, H6, and H7. But for • The parameter m is the message to be signed, and
temporary storage process using buffers a, b, c, d, e, f, g, H(m) is the part member of each message m.
and h. Use the initial buffer value as an initial value in the 2) DSA Key Generation Process, The following are
form of hexadecimal notation. Its standard default value is the steps of the DSA key generation:
in table 1. • Selects the values of the parameters p and q that are
both prime numbers with q a factor of p. According to
TABLE I. HEXADECIMAL NOTATION BUFFER VALUE
the equation (1).
Buffer Hexadecimal
H0 6A09E667 (1)
H1 BB67AE85
H2 3C6EF372
H3 A54FF53A
• Calculate the value of g with the equation (2) with the
H4 510E527F h parameter and must satisfy the equation (3).
H5 9B05688C
(2)
H6 1F83D9AB
H7 5BE0CD19 (3)
4) Value Processing : Value processing is the core • Determine the value of the private key x that is an
part of the hash function. This processing is carried out in 1 integer less than q.
round and has 64 operations in processing every 512 bits or
one message block. Each message block is m(1),m(2), ..., • Calculating the public key y with the equation (4).
m(n) [6]. where n is the number of message blocks. For (4)
each message block, perform the following steps:
• Initialize the initial value of the temporary storage
• The above process generates public key values (p, q,
buffer variable a=H0(i-1), b=H1(i-1), c=H2(i-1),
g, y) and private key values (p, q, g, x)
d=H3(i-1), e=H4(i- 1), f=H5(i-1), g=H6(i-1), h=H7(i-
1) on m(1).
horized licensed use limited to: NUST School of Electrical Engineering and Computer Science (SEECS). Downloaded on September 28,2023 at 04:09:31 UTC from IEEE Xplore. Restrictions ap
344
2022 International Seminar on Application for Technology of Information and Communication (iSemantic)
3) DSA Signing Process, The steps in the DSA for the encryption and decryption process while 3DES uses 2
signing process are as follows: (two) keys in the encryption and decryption process [1], [5].
• Search message digest for message m with the hash 3DES performs the encryption process using 2 (two)
function. different keys and the way to do it is alternately encryption
• Determine the value of the private k parameter that is decryption encryption for one encryption process, as
an integer less q. seen in the equation (11). The 3DES decryption still uses 2
(two) different keys and one decryption process as well as
• The result of the signature is the r parameter whose three decryption encryption decryption processes, as
value is fixed, and the s parameter as the value of seen in the equation (12) [1], [7]. Where C is Ciphertext and
each message m. P is Plaintext. For the process of the 3DES algorithm
globally, see figure 1.
• Calculate the value of r with the equation (5).
(11)
(5)
(12)
• Then calculate the value of s from each message
value m using the equation (6).
(6)
horized licensed use limited to: NUST School of Electrical Engineering and Computer Science (SEECS). Downloaded on September 28,2023 at 04:09:31 UTC from IEEE Xplore. Restrictions ap
345
2022 International Seminar on Application for Technology of Information and Communication (iSemantic)
• Implemented the SHA-256 hash function against the method. The comparison is done with the same
digital certificate file so that the message digest parameters at signing DSA: p = 9539; q = 251; h =
results are 256 bits with a length of 64 characters, 1577; x = 233; k = 137.
then the hexadecimal number conversion is carried
out for each character to produce 64 pairs of • The final result of the verification process will
hexadecimal numbers. produce the final verification value (v) with the
verifier value (s). If the value was same it will show
• Furthermore, the encryption of the converted message the certificate file is valid, whereas if the value is
digest results with DSA signing public key difference it will show the certificate file is invalid.
cryptography. The parameters used in the DSA
signing algorithm are as follows: p = 9539; q = 251; h IV. RESULT AND TESTING
= 1577; x = 233; k = 137. Data is obtained from the digital certificate file that has
been prepared. The certificate file is 3508 pixels x 2481
• Then, to increase the security of the DSA method,
pixels in size, see sample on figure 4. The file will be given
encryption is carried out with the 3DES cryptography
several attacks, namely changing the file new name [4],
algorithm. 3DES encryption uses 2 (two) keys: Key A
sharpening and Gaussian smoothing. The attacks above are
= OURCRYPT and Key B = OURCRIPT. Performed
used for testing, the attack will change the pixels of the
on the result of s converted to a binary number.
original certificate so that it can detect the authenticity of the
• The final result of the encryption is converted into original certificate. Pictures of each attack can be seen in
hexadecimal form and then stored in the database figure 5.
system along with the name & year attribute of the
digital certificate.
(a) (b)
horized licensed use limited to: NUST School of Electrical Engineering and Computer Science (SEECS). Downloaded on September 28,2023 at 04:09:31 UTC from IEEE Xplore. Restrictions ap
346
2022 International Seminar on Application for Technology of Information and Communication (iSemantic)
90 81 97 81 7A 90 AD AD 90 B1 18 6D 88 3D 50 3A B5 A9 4A 81
81 85 AD 55 AD 60 AD 90 7A 76 C2 B8 17 61 9F C8 12 B4 40 AC
C464AC88CF4B80818CA3BD1D5 85 9B 60 9B 8C 76 AD 7A B8 A6 A1 28 AD 7F A2 AB 16 BC EC 3F
38A9E4C63C3D16B94623115D3F 81 90 97 76 90 76 9B 60 97 85 B8 E3 7C 50 20 FF 86 BB 23 AD 28
A77402DB01BAD 81 97 6B 76 60 60 8C 9B 76 B1 7A E4 AB 81 4D 0E 79 AA E5 DE 72
A2 A2 81 55 6B 9B 85 55 60 85 7A D4 EF F6 6C 1B 2A 29 A7 D8 3D
9B 1B 8D B0 C8
9B 81 7A 8C B1 AD 9B B8 B8 A6 9D F8 EC 28 11 92 B2 D2 57 51
B1 B1 9B 76 A6 7A 6B 90 85 B1 D5 05 36 65 43 85 9E 72 A6 1F E4
D4A5F8D99EFFD3EA2CBFEEBE A6 A6 85 A6 A6 A2 85 6B 55 9B 83 93 0A 1D 7C 73 1D 25 72 F0 6E
E7B20D844AAC703555B2487B32 AD 81 81 7A 7A 90 A2 55 76 8C B0 3C 31 C8 C2 A4 C9 AA 54 E3
09A7A22E8B063C 8C 8C 85 6B 81 AD A2 85 76 6B A5 93 C9 EF 48 A1 7D D1 37 E3
55 B8 7A A2 7A 6B 6B A6 AD 85 AA DB 91 D8 21 56 30 C1 D1 E2
55 97 76 90 63 87
81 B8 B1 8C 90 97 6B 97 81 B1 81 8E D8 5D D7 F7 9A 4D 0B 5B CC
97 B1 9B 7A A2 A6 8C B8 97 60 91 36 70 CD C1 47 D1 3C 1A 83
49F5C6264F46FDA7E5961038E55 55 76 AD A6 8C 8C B1 7A 90 7A E8 81 11 BF A6 65 90 B5 26 E8 B0
FACA3C1CE6DDB0482E1710FF 76 90 60 90 A6 97 9B 9B 85 55 81 12 C0 07 1C 9F 65 D6 A9 59 67 98
B2FEAAFA68114 AD 6B A6 60 A2 60 55 B1 B1 85 CE 15 EB 71 C6 8F 3B C9 6F 49
6B B1 A6 7A 7A B1 7A 97 AD 60 4D DE 6C 91 AB 3D 8F 62 DB CE
60 81 7D 1B
B8 55 60 A6 81 81 B8 B8 B8 9B 88 C0 DA 27 88 57 94 E0 B4 DD
76 9B 8C 60 90 90 85 6B AD B8 E0 D5 5D D1 C4 13 EB F3 40 26
901E44999D3D51CCB2898EA187 AD A6 7A 60 AD A2 60 A6 A6 7A 58 EA 41 92 EC 09 7A 1D 5C D7
1EEA9572B7B65E4D58384A797C B8 8C A2 6B 85 A2 85 97 8C A6 EF D9 F8 BF A6 1D A6 5B 76 65
01EAF41EA033 81 9B 8C AD 76 AD 81 7A A2 B8 04 4B 04 E2 3B FC C2 D2 9E BF
A2 90 55 60 A6 7A B1 81 60 A6 02 39 34 68 5C 15 2C BC C1 4A
7A 55 76 76 E7 3C CD 52
09 E4 7A 76 8D 44 56 0B B4 80 13 B8 B1 9B A6 B8 A2 60 6B 90 7A
27 27 27 27 27 27 27 27 27 27 27
B4 F1 4F CD BF 54 BA 65 6B 7A 7A AD 6B 85 9B 60 6B 81 B1 60
27 27 27 27 27 27 27 27 27 27 27
60 D1 2F C9 26 48 C4 FF 15 B7 16 85 85 6B B1 76 55 76 81 7A A6 97
27 27 27 27 27 27 27 27 27 27 27
F5 E2 55 A8 20 BD AC D0 B5 CE A2 60 85 B1 81 60 8C 6B B1 A2
27 27 27 27 27 27 27 27 27 27 27
9E 02 1B D0 D9 CA 04 19 62 93 85 AD 6B B1 97 A6 AD 6B B8 6B
27 27 27 27 27 27 27 27 27 27 27
AD 6E 4E 40 49 EA 74 DC 6C CA B8 A6 7A A2 55 8C B8 55 81 7A
27 27 27 27 27 27 27 27 27
60 62 B8 7A 7A
18 6D 88 3D 50 3A B5 A9 4A 81 90 81 97 81 7A 90 AD AD 90 B1
27 27 27 27 27 27 27 27 27 27 27
C2 B8 17 61 9F C8 12 B4 40 AC 81 85 AD 55 AD 60 AD 90 7A 76
27 27 27 27 27 27 27 27 27 27 27
A1 28 AD 7F A2 AB 16 BC EC 3F 85 9B 60 9B 8C 76 AD 7A B8 A6
27 27 27 27 27 27 27 27 27 27 27
E3 7C 50 20 FF 86 BB 23 AD 28 81 90 97 76 90 76 9B 60 97 85 B8
27 27 27 27 27 27 27 27 27 27 27
E4 AB 81 4D 0E 79 AA E5 DE 72 81 97 6B 76 60 60 8C 9B 76 B1 7A
27 27 27 27 27 27 27 27 27 27 27
D4 EF F6 6C 1B 2A 29 A7 D8 3D A2 A2 81 55 6B 9B 85 55 60 85 7A
27 27 27 27 27 27 27 27 27
1B 8D B0 C8 9B
9D F8 EC 28 11 92 B2 D2 57 51 9B 81 7A 8C B1 AD 9B B8 B8 A6
27 27 27 27 27 27 27 27 27 27 27
D5 05 36 65 43 85 9E 72 A6 1F E4 B1 B1 9B 76 A6 7A 6B 90 85 B1
27 27 27 27 27 27 27 27 27 27 27
83 93 0A 1D 7C 73 1D 25 72 F0 6E A6 A6 85 A6 A6 A2 85 6B 55 9B
27 27 27 27 27 27 27 27 27 27 27
B0 3C 31 C8 C2 A4 C9 AA 54 E3 AD 81 81 7A 7A 90 A2 55 76 8C
27 27 27 27 27 27 27 27 27 27 27
A5 93 C9 EF 48 A1 7D D1 37 E3 8C 8C 85 6B 81 AD A2 85 76 6B
27 27 27 27 27 27 27 27 27 27 27
AA DB 91 D8 21 56 30 C1 D1 E2 55 B8 7A A2 7A 6B 6B A6 AD 85
27 27 27 27 27 27 27 27 27
63 87 55 97 76 90
horized licensed use limited to: NUST School of Electrical Engineering and Computer Science (SEECS). Downloaded on September 28,2023 at 04:09:31 UTC from IEEE Xplore. Restrictions ap
347
2022 International Seminar on Application for Technology of Information and Communication (iSemantic)
8E D8 5D D7 F7 9A 4D 0B 5B CC 81 B8 B1 8C 90 97 6B 97 81 B1 81
27 27 27 27 27 27 27 27 27 27 27
91 36 70 CD C1 47 D1 3C 1A 83 97 B1 9B 7A A2 A6 8C B8 97 60
27 27 27 27 27 27 27 27 27 27 27
E8 81 11 BF A6 65 90 B5 26 E8 B0 55 76 AD A6 8C 8C B1 7A 90 7A
27 27 27 27 27 27 27 27 27 27 27
12 C0 07 1C 9F 65 D6 A9 59 67 98 76 90 60 90 A6 97 9B 9B 85 55 81
27 27 27 27 27 27 27 27 27 27 27
CE 15 EB 71 C6 8F 3B C9 6F 49 AD 6B A6 60 A2 60 55 B1 B1 85
27 27 27 27 27 27 27 27 27 27 27
4D DE 6C 91 AB 3D 8F 62 DB CE 6B B1 A6 7A 7A B1 7A 97 AD 60
27 27 27 27 27 27 27 27 27
7D 1B 60 81
88 C0 DA 27 88 57 94 E0 B4 DD B8 55 60 A6 81 81 B8 B8 B8 9B
27 27 27 27 27 27 27 27 27 27 27
E0 D5 5D D1 C4 13 EB F3 40 26 76 9B 8C 60 90 90 85 6B AD B8
27 27 27 27 27 27 27 27 27 27 27
58 EA 41 92 EC 09 7A 1D 5C D7 AD A6 7A 60 AD A2 60 A6 A6 7A
27 27 27 27 27 27 27 27 27 27 27
EF D9 F8 BF A6 1D A6 5B 76 65 B8 8C A2 6B 85 A2 85 97 8C A6
27 27 27 27 27 27 27 27 27 27 27
04 4B 04 E2 3B FC C2 D2 9E BF 81 9B 8C AD 76 AD 81 7A A2 B8
27 27 27 27 27 27 27 27 27 27 27
02 39 34 68 5C 15 2C BC C1 4A A2 90 55 60 A6 7A B1 81 60 A6
27 27 27 27 27 27 27 27 27
E7 3C CD 52 7A 55 76 76
horized licensed use limited to: NUST School of Electrical Engineering and Computer Science (SEECS). Downloaded on September 28,2023 at 04:09:31 UTC from IEEE Xplore. Restrictions ap
348
2022 International Seminar on Application for Technology of Information and Communication (iSemantic)
6C 91 AB 3D 8F 72 66 BF E2 A1 29 7C 96 9F 54 22 54 54 9F
Gaussian 27 DB 9F B2 A1 54 6F 7A E6 27 FA 19 19
62 DB CE 7D 159.8784 16 D8 DE 90 B1 22 27 7C 09 0B 29 76 6A Invalid
1B Smoothing 9F 22 3D 7C 52 CA E3 9A 7A 37 58 ED 7C
7C 7A 8C 58 0C 58 0B 87 B3 9A 27
27 27 27 27 27 27 27 27 27 27 27 27 27 27
88 C0 DA 27 88 27 27 27 27 27 27 27 27 27 27 27 27 27 27
57 94 E0 B4 DD None 0 27 27 27 27 27 27 27 27 27 27 27 27 27 27 Valid
27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27 27
E0 D5 5D D1 27 27 27 27 27 27 27 27 27 27 27 27 27 27
C4 13 EB F3 40 E9 D3 6F 90 4E 5F 9D CE D8 D1 43 76 27
B3 6F DE ED D1 34 D8 37 40 58 6F DE D9 27 27 27 27 27 27
26 58 EA 41 92 Change
7.7192 B3 40 90 C0 E9 C5 63 C3 29 10 6A CC C5 27 27 27 27 27 27 Invalid
EC 09 7A 1D File Name 52 D8 76 27 34 9F EF 22 8C 10 4C 45 DE 27 27 27 27 27 27
5C D7 EF D9 F8 BF 8A 42 31 1D 28 29 90 4E 42 C1 B1
24 7A CC 90 D8 22 CE D6 3A 97 9B 29 1F 27 27 27 27 27 27
BF A6 1D A6
CC 16 16 6A AD CA 24 1F 7A E2 E6 37 10 27 27 27 27 27 27
5B 76 65 04 4B Sharpen 20.7216 9F 40 52 C0 D8 5E 09 EF 29 78 9A E3 19 Invalid
27 27 27 27 27 27
04 E2 3B FC C2 7A 72 9F 5E 34 ED 3D 67 9F 09 0C 87 9F
9F 29 52 67 BF 58 9A D9 27 90 0B B1 27 27 27 27 27 27
D2 9E BF 02 39
D8 D3 CC 85 72 9F 83 27 3A E6 BF EF B2 27 27 27 27 27 27
34 68 5C 15 2C
Gaussian 29 22 7C 29 16 CA 27 37 D9 C7 9A 37 39 27 27 27 27
BC C1 4A E7 158.0685 58 EF 9F A4 E9 19 36 7C 0F 39 29 29 16 Invalid
3C CD 52 Smoothing DB 27 E1 16 37 10 37 28 E8 36 E0 78 6F D3
9F 40 58 10 72 9F 85 31 7A C1 10
Based on the proposed method, this study focuses on 3 seconds while in the verify process it is 0.03814 seconds so it
(three) sequential methods SHA-256 Signing DSA gets a 1:2 comparison.
3DES encryption in the Signing Process on figure 2, then in
table 2 describes the results of each process, where the final REFERENCES
result of Signing Process is 3DES encryption or the digital [1] C. A. Sari, E. H. Rachmawanto, and C. A. Haryanto, ‘Cryptography
signature used. table 3 describes the Verify Process which is Triple Data Encryption Standard (3DES) for Digital Image
the result of SHA-256 and 3DES decryption compared to Security’, Scientific Journal of Informatics, vol. 5, no. 2, Art. no. 2,
Nov. 2018, doi: 10.15294/sji.v5i2.14844.
Verify DSA as shown in figure 3. [2] S. Aiswarya and R. Gomathi, ‘Review On Cryptography and
Steganography Techniques in Video’, in 2018 IEEE International
Conference on Computational Intelligence and Computing
Research (ICCIC), Dec. 2018, pp. 1–4. doi:
10.1109/ICCIC.2018.8782409.
[3] D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, A. Susanto,
and M. Doheir, ‘A Comparative Study of Image Cryptographic
Method’, in 2018 5th International Conference on Information
Technology, Computer, and Electrical Engineering (ICITACEE),
Sep. 2018, pp. 336–341. doi: 10.1109/ICITACEE.2018.8576907.
[4] R. Damara Ardy, O. R. Indriani, C. A. Sari, D. R. I. M. Setiadi, and
E. H. Rachmawanto, ‘Digital image signature using triple
protection cryptosystem (RSA, Vigenere, and MD5)’, in 2017
International Conference on Smart Cities, Automation & Intelligent
Computing Systems (ICON-SONICS), Nov. 2017, pp. 87–92. doi:
10.1109/ICON-SONICS.2017.8267827.
[5] A. M. Qadir and N. Varol, ‘A Review Paper on Cryptography’, in
2019 7th International Symposium on Digital Forensics and
Security (ISDFS), Jun. 2019, pp. 1–6. doi:
10.1109/ISDFS.2019.8757514.
Fig. 6. Average Speed Test [6] S. Kumar and V. Singh, ‘A Review of Digital signature and hash
function based approach for secure routing in VANET’, in 2021
International Conference on Artificial Intelligence and Smart
In figure 6, the average speed information is obtained Systems (ICAIS), Mar. 2021, pp. 1301–1305. doi:
from each speed test experiment carried out on each 10.1109/ICAIS50930.2021.9395882.
certificate file. The average speed in the signing process is [7] M. M. Hoobi and M. M. Hoobi, ‘Improved Structure of Data
0.01907 while the average speed in the verification process is Encryption Standard Algorithm’, Journal of Southwest Jiaotong
0.03814, so the comparison of the speed of the signing University, vol. 55, no. 5, Art. no. 5, 2020, Accessed: Jun. 14, 2022.
[Online]. Available:
process and verify process is 1: 2. http://www.jsju.org/index.php/journal/article/view/723
[8] M. A. Nazal, R. Pulungan, and M. Riasetiawan, ‘Data Integrity and
V. CONCLUSION Security using Keccak and Digital Signature Algorithm (DSA)’,
Based on the experimental results in table 4. it can be IJCCS (Indonesian Journal of Computing and Cybernetics
concluded that the application of the 3-level cryptography Systems), vol. 13, no. 3, Art. no. 3, Jul. 2019, doi:
10.22146/ijccs.47267.
algorithms SHA-256, DSA, and 3DES was successful in [9] A. Safaa, F. Abdullatif, and T. Hasan, ‘Generating and Validating
protecting digital certificate file authentication. The use of DSA Private Keys from Online Face Images for Digital
the SHA-256 hash function is in line with the DSA method Signatures’, International Journal on Advanced Science,
and the implementation of 3DES which uses 2 private keys Engineering and Information Technology, vol. 9, p. 2019, Jun.
so that the security of digital certificate files can be 2019, doi: 10.18517/ijaseit.9.3.8950.
[10] P. Patil, P. Narayankar, N. D.g, and M. S.m, ‘A Comprehensive
increased. The pixel changes that appear in the MSE Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA
calculation have the lowest value of 7.4510 and the highest and Blowfish’, Procedia Computer Science, vol. C, no. 78, pp.
value of 165.0561 when the file is manipulated, it answers 617–624, 2016, doi: 10.1016/j.procs.2016.02.108.
the security of the proposed method is maintained because [11] W. Fang, W. Chen, W. Zhang, J. Pei, W. Gao, and G. Wang,
the only valid file is the original file. The average speed test ‘Digital signature scheme for information non-repudiation in
blockchain: a state of the art review’, EURASIP Journal on
of the proposed method in the signing process is 0.01907
horized licensed use limited to: NUST School of Electrical Engineering and Computer Science (SEECS). Downloaded on September 28,2023 at 04:09:31 UTC from IEEE Xplore. Restrictions ap
349
2022 International Seminar on Application for Technology of Information and Communication (iSemantic)
horized licensed use limited to: NUST School of Electrical Engineering and Computer Science (SEECS). Downloaded on September 28,2023 at 04:09:31 UTC from IEEE Xplore. Restrictions ap
350