TELKOMNIKA Telecommunication, Computing, Electronics and Control
Authentication system for e-certificate by using RSA’s digital signature
Dublin Core
Title
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Authentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signature
Subject
Checking application, Digital signature, E-certificate, RSA, Signing application
Description
Online learning and teaching become the popular channel for all participants, because they can access the courses everywhere with the high-speed internet. E-certificate is being prepared for everyone who has participated or passed the requirements of the courses. Because of many benefits from e-certificate, it may become the demand for intruders to counterfeit the certificate. In this paper, Rivest-Shamir-Adleman (RSA)’s digital signature is chosen to sign e-certificate in order
to avoid being counterfeited by intruders. There are two applications to manage e-certificate. The first application is the signing application to sign the sub image including only participant’s name in e-certificate. In general, the file of digital signature is divided from e-certificate. That means, both of them must be selected to compare each other in checking application. In fact, the solution will be approved when each pixel of participant’s name is equal to each part from the decrypted message at the same position. In experimental session, 40 e-certificates are chosen
for the implementation. The results reveal that the accuracy is 100% and both of signing and checking processes are completed rapidly fast, especially when signing application is applied with Chinese remainder theorem (CRT) or the special technique of CRT. Therefore, the proposed method is one of the best solutions to protect e-certificate from the forgery by intruders.
to avoid being counterfeited by intruders. There are two applications to manage e-certificate. The first application is the signing application to sign the sub image including only participant’s name in e-certificate. In general, the file of digital signature is divided from e-certificate. That means, both of them must be selected to compare each other in checking application. In fact, the solution will be approved when each pixel of participant’s name is equal to each part from the decrypted message at the same position. In experimental session, 40 e-certificates are chosen
for the implementation. The results reveal that the accuracy is 100% and both of signing and checking processes are completed rapidly fast, especially when signing application is applied with Chinese remainder theorem (CRT) or the special technique of CRT. Therefore, the proposed method is one of the best solutions to protect e-certificate from the forgery by intruders.
Creator
Kritsanapong Somsuk, Mongkhon Thakong
Source
DOI: 10.12928/TELKOMNIKA.v18i6.17278
Publisher
Universitas Ahmad Dahlan
Date
October 2020
Contributor
Sri Wahyuni
Rights
ISSN: 1693-6930
Relation
http://journal.uad.ac.id/index.php/TELKOMNIKA
Format
PDF
Language
English
Type
Text
Coverage
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Files
Collection
Citation
Kritsanapong Somsuk, Mongkhon Thakong, “TELKOMNIKA Telecommunication, Computing, Electronics and Control
Authentication system for e-certificate by using RSA’s digital signature,” Repository Horizon University Indonesia, accessed November 22, 2024, https://repository.horizon.ac.id/items/show/4229.
Authentication system for e-certificate by using RSA’s digital signature,” Repository Horizon University Indonesia, accessed November 22, 2024, https://repository.horizon.ac.id/items/show/4229.