On the application of noiseless steganography and elliptic curves cryptography digital signature algorithm methods in securing text messages

Juhari, Juhari and Andrean, Mohamad Febry (2022) On the application of noiseless steganography and elliptic curves cryptography digital signature algorithm methods in securing text messages. Cauchy: Jurnal Matematika Murni dan Aplikasi, 7 (3). pp. 483-492. ISSN 24773344

[img]
Preview
Text
11586.pdf - Published Version
Available under License Creative Commons Attribution Share Alike.

Download (702kB) | Preview

Abstract

Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field used, one of which is the infinite field prima (F_P where p>3). Elliptic curve cryptography can be used for multiple protocol purposes, digital signatures, and encryption schemes. The purpose of this study is to determine the process of hiding encrypted messages using the Noiseless Steganography method as well as the generation of private keys and public keys and the process of verifying the validity of the Elliptic Curves Cryptography Digital Signature Algorithm (ECDSA). The result of this thesis is that a line graph is obtained that store or hides a message using the steganography method and a message authenticity from the process of key generation and verification of validity using the ECDSA method. By selecting three samples consisting of one test sample and two differentiating samples, a line graph, an MD5 hash value, and a value at the point are obtained M(r,s) different. Successively obtained values M(r,s) to message “Matematika 2018”, “MATEMATIKA 2018”, and “2018 matematika” are M(94,67),M(15,17), and M(9,16). The discussion in this thesis only covers the elliptic curves on prime finite field. So, for the next thesis, the next researcher can do a discussion about the elliptic curve on the finite field (F_(2^m )) or the application of elliptic curve cryptography and other steganography methods.

Item Type: Journal Article
Keywords: cryptography; steganography; algorithm; elliptic curve; digital signature
Subjects: 01 MATHEMATICAL SCIENCES > 0102 Applied Mathematics > 010203 Calculus of Variations, Systems Theory and Control Theory
Divisions: Faculty of Mathematics and Sciences > Department of Mathematics
Depositing User: Juhari Juhari
Date Deposited: 11 Oct 2022 10:13

Downloads

Downloads per month over past year

Origin of downloads

Actions (login required)

View Item View Item