On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages

Juhari Juhari, Mohamad Febry Andrean

Abstract


Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field used, one of which is the infinite field prima (  where ). Elliptic curve cryptography can be used for multiple protocol purposes, digital signatures, and encryption schemes.The purpose of this study is to determine the process of hiding encrypted messages using the Noiseless Steganography method  as well as the generation of private keys and public keys and the process of verifying the validity of the Elliptic Curves Cryptography Digital Signature Algorithm (ECDSA).  The result of this thesis is that a line graph is obtained that store or hides a message using the steganography method and a message authenticity from the process of key generation and verification of validity using the ECDSA method. By selecting three samples consisting of one test sample and two differentiating samples, a line graph,  an MD5 hash value, and a value at the point are obtained  different. Successively obtained values  to message “Matematika 2018”, “MATEMATIKA 2018”, and “2018 matematika” are and . The discussion in this thesis only covers the elliptic curves on prime finite field. So, for the next thesis, the next researcher can do a discussion about the elliptic curve on the finite field  or the application of elliptic curve cryptography and other steganographic methods

Keywords


Cryptography; Steganography; Algorithm; Elliptic Curve; Digital Signature

Full Text:

PDF

References


R. Munir, Kriptografi, Bandung: Informatika Bandung, 2019.

R. A. M. M.-K. Mojtaba Bisheh-Niasar, "Cryptographic accelerators for digital signature based on Ed25519," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 29, no. 7, pp. 1297-1305, 2021.

R. Munir, "Penggunaan Tanda-Tangan Digital Untuk Menjaga Integritas," 2005.

P. Kitsos, N. Sklavos and O. Koufopavlou, "An Efficient Implementation Of The Digital Signature Algorithm," 2016.

J. Tian, G. Xiong, Z. Li and G. Gou, "A Survey of Key Technologies for Constructing Network Covert Channel. Security and Communication Networks," pp. 1-20, 2020.

S. Bruce, Applied Crypthography, 1994.

N. Hayati, A. Budiman and M. Sharif, "Implementasi Algoritma RC4A dan MD5 untuk Menjamin Confidentiality dan Integrity pada File Teks," vol. 1, p. 7, 2017.

A. Ligueri, "Design and Implementation of Multilevel Security Architectures," Roma, 2016.

M. S. R. M. S. M. L. S. A. H. M. M. &. A. H. M. Taha, "Combination of steganography and cryptography: A Short Survey," vol. 518, 2019.

R. A. d. L. T. Oktoviana, "Implementasi Kriptografi dan Steganografi Menggunakan Algoitma RSA dan Metode LSB," Research Article, 2014.

H. A, "Implementasi Fungsi Hash MD5 dan Kriptografi Algoritma RSA Pada Pembuatan Tanda Tangan Digital," 2021.

S. F. Mediawati, "Penggunaan Kritptografi Kurva Eliptik Pada Proses Penyandian Elgamal," 2013.

A. Triwinarko, "Elliptic Curve Digital Signature Algorithm (ECDSA)," p. 6, 2005.

W. Stallings, Criptography and Net Securitywork Principles and Practice, Pearson Education Limited, 2017.

P. D. J. Rosenthal, "Cryptography," University of Zuric, 2005.




DOI: https://doi.org/10.18860/ca.v7i3.17358

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Juhari Juhari, Mohamad Febry Andrean

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Editorial Office
Mathematics Department,
Universitas Islam Negeri Maulana Malik Ibrahim Malang
Gajayana Street 50 Malang, East Java, Indonesia 65144
Faximile (+62) 341 558933
e-mail: cauchy@uin-malang.ac.id

Creative Commons License
CAUCHY: Jurnal Matematika Murni dan Aplikasi is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.