The aim of this research is to analyze the security of digital signature schemes, so that the integrity of the data in the signature document is better maintained and the recipient is trusted to have come from a legitimate sender. The rapid development of technology today means that all signed physical documents have turned into softfile documents with digital signatures. The process of creating a digital signature begins with creating a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document. Several studies have used the concept of algorithms in cryptography, namely the RSA cryptographic algorithm, but it still has shortcomings in that it cannot be proven whether the document received by the recipient is a document from a legitimate sender and there have been no changes to the document. In this research the author tries to perfect previous research where users can validate the authenticity of documents and believe that the sender of the document is a legitimate sender with a combination of the RSA and SHA3-512 algorithms. The document used in this research has .pdf extension. Mitm attack testing resulted in the conclusion that the strength of the secret key was the basis for the scheme being built. The digital signature scheme that is built can validate the authenticity of documents received by the recipient and prove that the document was sent by a legitimate sender. Time for document validation and signature depends on the size of the uploaded pdf file
Copyrights © 2024