Code-Based Document Authentication Using SHA-3 and McEliece

Vadillatul Ni'ma Maulidya, Muhammad Khudzaifah

Abstract


Personal data protection is essential to ensure the security and authenticity of digital documents. One approach to achieving document authenticity is through a code-based document authentication mechanism. This study proposes a document authentication scheme using the SHA-3 hash function combined with the McEliece code-based cryptosystem with Hamming code. The authentication process begins by hashing the document content using SHA-3 to generate a message digest. The resulting hash value is converted into binary form and then encoded and encrypted using the public key of the McEliece cryptosystem, producing an authentication code. During the verification phase, the received authentication code is processed through the decoding mechanism using the private key, allowing error correction and recovery of the original hash representation. A document is considered authentic if the decoded hash matches the hash value generated from the received document. Experimental results show that the authentication code depends on the McEliece key pair used, ensuring uniqueness and resistance to forgery. Furthermore, the combination of SHA-3 and the McEliece cryptosystem exhibits an Avalanche Effect close to 50%, indicating strong diffusion properties. These results demonstrate that the proposed code-based authentication scheme provides a reliable cryptographic solution for ensuring the authenticity and protection of digital documents, particularly against future cryptanalytic threats.

Keywords


SHA-3 algorithm; McEliece cryptosystem; code-based authentication; digital document; message digest

Full Text:

PDF

References


[1] A. Lorien and T. Wellem, “Implementasi sistem otentikasi dokumen berbasis quick response QR code dan digital signature,” Rekayasa Sistem dan Teknologi Informasi RESTI, vol. 5,no. 4, pp. 663–672, 2021. doi: 10.29207/resti.v5i1.3316.

[2] M. H. Santoso et al., “Perbandingan algoritma kriptografi hash MD5 dan SHA-1,” Semantika, vol. 2, no. 1, pp. 54–59, 2019.

[3] M. P. Sari, “Analisis algoritma SHA-3 keamanan pada data pribadi,” Tecnoscienza, vol. 5, no. 2, pp. 231–242, 2021.

[4] F. Kurniawan, A. Kusyanti, and H. Nurwarsito, “Analisis dan implementasi algoritma

SHA-1 dan SHA-3 pada sistem autentikasi garuda training cost,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 1, no. 9, pp. 803–812, 2017.

[5] N. F. Ilmiyah, “Kajian tentang kriptosistem mceliece dalam menghadapi tantangan komputer kuantum di era revolusi industri 4.0,” Prosiding Seminar Nasional MIPA, pp. 216–226, 2018.

[6] M. Kumar, “Post-quantum cryptography algorithm’s standardization and performance analysis,” Array, vol. 15, 2022. doi: 10.1016/j.array.2022.100242.

[7] Nurhayati, Kastari, and F. Fahrianto, “End-to-end encryption on the instant messaging application based android using AES cryptography algorithm to a text message,” CITSM, 2022. doi: 10.1109/CITSM56380.2022.993596.

[8] R. Munir, Kriptografi. Institut Teknologi Bandung, 2019.

[9] Basri, “Kriptografi simetris dan asimetris dalam perspektif keamanan data dan kompleksitas komputasi,” Jurnal Ilmiah Ilmu Komputer, vol. 2, p. 2, 2016.

[10] K. J. Jaameri, “Code-based cryptography,” School of Science, 2019.

[11] M. Baldi, M. Bianchi, and F. Chiaraluce, “Enhanced public key security for the mceliece cryptosystem,” Journal of Cryptology, vol. 29, 2016. doi: 10.1007/s00145-014-9187-8.

[12] S. Sinurat and E. R. Siagan, “Learning text data security in documents using mceliece’s algorithm,” Jurnal Infokum, vol. 10, p. 5, 2022.

[13] M. H. Harianja, “Analisa fungsi hash untuk mendeteksi otentikasi file video menerapkan metode n-hash,” Management of Information System Journal, vol. 2, p. 1, 2023.

[14] E. C. Prabowo and I. Afrianto, “Penerapan digital signature dan kriptografi pada otentikasi sertifikat tanah digital,” Jurnal Ilmiah Komputer dan Informatika, vol. 6, p. 2, 2017. doi:10.34010/komputa.v6i2.2481.

[15] I. Rahim et al., “Komparasi fungsi hash md5 dan sha256 dalam keamanan gambar dan teks,” Ikraith-Informatika, vol. 7, p. 2, 2023.

[16] C. H. Romine, “Sha-3 standard: Permutation-based hash and extendable-output functions,” Federal Information Processing Standards Publications, 2015.

[17] A. Alahmadi, S. Calkavur, et al., “A new code based signature scheme for blockchain technology,” Mathematics, vol. 11, p. 1177, 2023. doi: 10.3390/math11051177.

[18] D. Upadhyay, N. Gaikwad, et al., “Investigating the avalanche effect of various crypto-graphically secure hash functions and hash-based applications,” IEE Access, vol. 10, 2022. doi: 10.1109/ACCESS.2022.3215778.




DOI: https://doi.org/10.18860/jrmm.v5i2.37652

Refbacks

  • There are currently no refbacks.