IMPELEMENTATION OF DSA ALGORITHM IN DIGITAL DOCUMENT SECURITY
Abstract
The Digital Signature Algorithm (DSA) is a cryptographic method used to ensure the integrity and authenticity of data by generating a unique digital signature for each document. In this study, the author examines the implementation steps of DSA, including the generation of public and private keys, as well as how digital signatures can be used to verify the sender's identity and prevent forgery. The implementation results indicate that the use of DSA significantly enhances the security of digital documents, providing strong protection against data tampering. These findings are expected to contribute to the development of more effective and reliable information security systems in the digital era.
Keywords : Cryptography, Hash Function, Asymmetric Key, Digital Signature Algorithm, Secure Hash Algorithm-256
References
Alwan, D. A., & Qomariasih, N. (2024). Penerapan Tanda Tangan Digital dan Secure Coding berdasarkan OWASP pada Sistem E-Control Tugas Akhir. Info Kripto, 18(2), 49–55. https://doi.org/10.56706/ik.v18i2.100
Lapian, R., Soeikromo, D., & Mamengko, R. S. (2024). Pengaturan Penggunaan Tanda Tangan Elektronik Menurut Uu No. 19 Tahun 2016 Tentang Informasi Dan Transaksi Elektronik. Lex Privatum, 13(1).
Ramdani, M., Dzulfiqar, M. F., Abdallah, Z. A., Pahlevi, Z. R., & Rosyani, P. (2024). Studi Perbandingan Teknik Thresholding Untuk Binarisasi Tanda. 2(2), 166–172.
Ajhari, Abdul Azzam, and Windarto Windarto. 2018. "Implementation of Affine Cipher and AES-128 Algorithms for Message Security and One-Time Password Account Registration in Android-Based Chatting Applications at Hang Tuah 1 High School Jakarta." Skanika 1(1): 323–34.
Alfani, Mhd Reza, Mhd Furqan, and Yusuf Ramadhan Nasution. 2024. "Text Data Security Using Digital Signature Algorithm (DSA) and Advanced Encryption Standard (AES)." Journal of Science and Social Research 4307(1): 301–6.
Alwan, Dhana Arvina, and Nurul Qomariasih. 2024. "Application of Digital Signatures and Secure Coding Based on OWASP in the E-Control Final Project System." Crypto Info 18(2): 49–55. doi: 10.56706/ik.v18i2.100.
Eritza, Afnita, Mukhlis Ramadhan, and Hafizah Hafizah. 2022. ―Application Digital Signature SHA Method and DSA Calculation Example." Journal Triguna Dharma Information System (JURSI TGD) 1(6):906. doi: 10.53513/jursi.v1i6.6002
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Annisah Amalia, Mhd. Zulfansyuri Siambaton, Tasliyah Haramaini

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.