Pengembangan Algoritma ECDSA dengan Modifikasi Perkalian Skalar menggunakan Double Basae Chain

Penulis

  • Hafiz Abdul Fatah Kurniawan
  • Shelvie Nidya Neyman Institut Pertanian Bogor, Bogor
  • Sony H Wijaya Institut Pertanian Bogor, Bogor

DOI:

https://doi.org/10.25126/jtiik.20241127446

Abstrak

Penelitian ini mengeksplorasi modifikasi parameter perkalian skalar dalam algoritma Elliptic Curve Digital Signature Algorithm (ECDSA) menggunakan metode Double Base Chain (DBC) dalam Era Revolusi 4.0. ECDSA, sebagai algoritma kriptografi asimetris, umum digunakan untuk memberikan integritas dan otentikasi pada data digital. Penelitian ini menilai apakah penggunaan DBC dapat meningkatkan performa ECDSA dalam hal waktu komputasi dan penggunaan memori. Hasil penelitian menunjukkan bahwa meskipun modifikasi ECDSA dengan DBC tidak selalu memberikan performa yang superior. Waktu yang dibutuhkan untuk key generation, signing, dan verification cenderung lebih lama, dan penggunaan memori bervariasi tergantung pada konfigurasi dan parameter tertentu. Faktor-faktor seperti struktur kurva, panjang kurva, parameter kurva, dan implementasi memiliki dampak signifikan terhadap performa. Pengujian avalanche effect menunjukkan variasi dalam keteracakan kunci privat pada berbagai jenis kurva. Meskipun belum optimal, penelitian ini menyoroti potensi peningkatan keamanan dengan fokus pada peningkatan keteracakan private key pada ECDSA. Temuan ini memberikan dasar bagi eksplorasi lebih lanjut dalam pengembangan algoritma kriptografi yang lebih aman dan efisien, dengan mempertimbangkan keseimbangan antara performa dan keamanan. Dalam konteks Era Revolusi 4.0, di mana keamanan informasi menjadi semakin penting, penelitian ini memberikan wawasan berharga untuk pengembangan teknologi keamanan yang lebih baik.

 

Abstract

This study explores the modification of scalar multiplication parameters in the Elliptic Curve Digital Signature Algorithm (ECDSA) using the Double Base Chain (DBC) method in the Era of the Fourth Industrial Revolution (Industry 4.0). ECDSA, as an asymmetric cryptographic algorithm, is commonly used to provide integrity and authentication to digital data. The research evaluates whether the use of DBC can enhance ECDSA performance in terms of computational time and memory usage. The results indicate that, although modifying ECDSA with DBC does not always yield superior performance, the time required for key generation, signing, and verification tends to be longer, and memory usage varies depending on specific configurations and parameters. Factors such as curve structure, curve length, curve parameters, and implementation significantly impact performance. Avalanche effect testing reveals variations in the traceability of private keys across different curve types. Despite not achieving optimal results, the study highlights the potential for improving security by focusing on enhancing the traceability of private keys in ECDSA. These findings provide a foundation for further exploration in the development of more secure and efficient cryptographic algorithms, considering the balance between performance and security. In the context of the Fourth Industrial Revolution, where information security is increasingly crucial, this research offers valuable insights for the advancement of better security technologies.

Downloads

Download data is not yet available.

Referensi

ALANAZI, N., KHAN, E. AND GUTUB, A., 2021. Efficient security and capacity techniques for Arabic text steganography via engaging Unicode standard encoding. Multimedia Tools and Applications, 80(1), pp.1403–1431. https://doi.org/10.1007/s11042-020-09667-y.

AL-ZUBAIDIE, M., ZHANG, Z. AND ZHANG, J., 2019. Efficient and secure ECDSA algorithm and its applications: A survey. International Journal of Communication Networks and Information Security, https://doi.org/10.17762/ijcnis.v11i1.3827.

CAHYADI, T.N., 2020. Aspek Hukum Pemanfaatan Digital Signature Dalam. Jurnal Rechtsvinding, 9, pp.219–236.

CHENG, L.M., WONG, K.W., LEE, E.C.W. AND LIAO, X., 2006. Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving. Image integrity and copyright protection View project ITS Project on Smart Card View project Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving. [online] Available at: <https://www.researchgate.net/publication/220336386>.

DOCHE, C. AND HABSIEGER, L., 2016. A Tree-Based Approach for Computing Double-Base Chains A Tree-Based Approach for Computing Double-Base Chains. In Australasian Conference on Information Security and Privacy (pp. 433-446). Springer, Berlin, Heidelberg., (June 2008), pp.433–446.

DOERNER, J., KONDI, Y., LEE, E. AND SHELAT, A., 2019. Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. Proceedings - IEEE Symposium on Security and Privacy, 2019-May, pp.1051–1066. https://doi.org/10.1109/SP.2019.00024.

GENC, Y. AND AFACAN, E., 2021. Design and implementation of an efficient elliptic curve digital signature algorithm (ECDSA). 2021 IEEE International IOT, Electronics and Mechatronics Conference, IEMTRONICS 2021 - Proceedings. https://doi.org/10.1109/IEMTRONICS52119.2021.9422589.

KHAN, S. AND KHAN, R., 2018. Elgamal elliptic curve based secure communication architecture for microgrids. Energies, 11(4), pp.1–14. https://doi.org/10.3390/en11040759.

MAHINDRAKAR, M.S., 2014. Evaluation of Blowfish Algorithm based on Avalanche Effect. International Journal of Innovations in Engineering and Technology (IJIET),

MENEZES, A. AND STEBILA, D., 2021. Challenges in Cryptography. IEEE Security and Privacy, 19(2), pp.70–73. https://doi.org/10.1109/MSEC.2021.3049730.

PRABOWO, E.C. AND AFRIANTO, I., 2017. Penerapan Digital Signature dan Kriptografi Pada Otentikasi Sertifikat Tanah Digital. Jurnal Ilmiah Komputer dan Informatika (KOMPUTA), 6(2), pp.83–90.

PRAMUKANTORO, E.S., BAKHTIAR, F.A., AJI, A.L.B. AND DEWA, D.H.P., 2019. Implementasi Mekanisme End-To-End Security pada IoT Middleware. Jurnal Teknologi Informasi dan Ilmu Komputer, 6(3), p.335. https://doi.org/10.25126/jtiik.2019631401.

SETYAWAN, G., PINANDITO, A. AND PRADANA, F., 2015. Performance Calculation of Hash Sha-1 in Embedded System Using Arduino. Jurnal Penelitian dan Pengembangan Komunikasi dan Informatika, 5(3), p.122769.

SHARMA, A.K., 2019. Design and Mathematical Structure of Cryptographic Hash Function SHA-512. 11(2), pp.41–47.

TCHERNYKH, A., BABENKO, M., CHERVYAKOV, N., MIRANDA-LOPEZ, V., AVETISYAN, A., DROZDOV, A.Y., RIVERA-RODRIGUEZ, R., RADCHENKO, G. AND DU, Z., 2020. Scalable Data Storage Design for Nonstationary IoT Environment with Adaptive Security and Reliability. IEEE Internet of Things Journal, 7(10), pp.10171–10188. https://doi.org/10.1109/JIOT.2020.2981276.

TRIWINARKO, A., 2005. Elliptic Curve Digital Signature Algorithm (ECDSA). Bandung.

VERMA, R. AND SHARMA, A.K., 2020. Cryptography: Avalanche effect of AES and RSA. International Journal of Scientific and Research Publications (IJSRP), 10(4), p.p10013. https://doi.org/10.29322/ijsrp.10.04.2020.p10013.

YU, W., MUSA, S. AL AND LI, B., 2020. Double-base chains for scalar multiplications on elliptic curves. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12107 LNCS, pp.538–565. https://doi.org/10.1007/978-3-030-45727-3_18.

Zeadally, S., Kumar, A. and Sklavos, N., 2019. Cryptographic technologies and protocol standards for Internet of Things. Internet of Things, [online] (xxxx), p.100075. https://doi.org/10.1016/j.iot.2019.100075.

Unduhan

Diterbitkan

25-04-2024

Terbitan

Bagian

Ilmu Komputer

Cara Mengutip

Pengembangan Algoritma ECDSA dengan Modifikasi Perkalian Skalar menggunakan Double Basae Chain. (2024). Jurnal Teknologi Informasi Dan Ilmu Komputer, 11(2), 275-284. https://doi.org/10.25126/jtiik.20241127446