Modification of Advance Encryption Standard(AES) and
Rivest–Shamir–Adleman(RSA) Algorithms for Data Authentication on
Study Results Card
Karina Andriani
1
, Roslina
2
and B. Herawan Hayadi
1
1
Computer Science, Main Potential University, Medan, Indonesia
2
Department of Computer Engineering, Politeknik Negeri Medan, Medan, Indonesia
Keywords:
AES and RSA Algorithms, Data Authentication.
Abstract:
Authentication is a process carried out to validate the authenticity of data and the owner of the data. The
method used to form an authentication system is cryptography. One of the cryptographic algorithms that
are often used is the Advance Encryption Standard (AES) because it has been tested for its resistance to all
kinds of attacks on data. Not only is it able to encrypt or encode data, but the AES algorithm is also able
to decrypt or restore encrypted data so that the data can be read or understood again. Besides that, the RSA
algorithm is a cryptographic algorithm that is often used for authentication. The RSA algorithm has a private
key concept where the encryption and decryption keys are different so that it is stronger to serve as a data
security algorithm. Therefore, modifications to the AES and RSA algorithms were made to produce a better
authentication system. In this study, modifications were made to the AES and RSA algorithms for data security
authentication on the study results card.
1 INTRODUCTION
In the digital era, it is convenient to falsify data and
the identity of the data owner. Counterfeiting is car-
ried out for various interests that benefit the perpetra-
tor. Therefore, security is the solution to the threat of
data forgery and the identity of the data owner by us-
ing modern security techniques such as cryptography.
One of the data security techniques in the form of data
authenticity validity is a digital signature. Digital Sig-
nature can be applied in verifying the authenticity of
data and authenticating the authenticity of the owner
of the data. Digital Signature is a cryptographic value
that depends on the message and the sender. The
way a Digital Signature works is almost the same as
how a regular document ”signature” works (Amik and
Cipta, 2021).
There are two algorithms in the Digital Signature
system, namely the signing algorithm to sign a doc-
ument M and generate a signature (sign) ρ, and the
verify algorithm that returns true if the signature ρ
belongs to the signer and for document M (Waruwu
et al., 2020).
RSA is a cryptographic algorithm that is often
used for making Digital Signatures because this al-
gorithm produces two keys that are mathematically
connected. Where the public key is used for the en-
cryption process while the private key is used for
the decryption process(Ahmed, 2022).RSA is a pop-
ular public-key cryptographic algorithm. This algo-
rithm was found by three researchers from MIT (Mas-
sachusetts Institute of Technology) in 1976: Rivest,
Shamir, and Adleman. The RSA algorithm uses a
public key and a private key, where the public key
can be known by many people to encrypt messages,
while the private key can only be known by certain
parties to decrypt messages. The security of this algo-
rithm lies in the difficulty of factoring large integers
into prime factors. This factoring decrease to obtain
the private key. RSA’s operating mechanism is conve-
nient to understand and simple, but powerful (Parid-
dudin and Syawaludin, 2021).
AES Method The Advanced Encryption Standard
(AES) method is an encryption method that uses a
symmetric key with a key length of 128, 192, and 256
bits to encrypt and decrypt data in 128-bit blocks. The
AES method that uses a block cipher system can per-
form symmetric key encryption operations with oper-
ating modes. In addition, AES has advantages in se-
curity, speed, and characteristics of the algorithm and
Andriani, K., Roslina, . and Hayadi, B.
Modification of Advance Encryption Standard (AES) and Rivest–Shamir–Adleman (RSA) Algorithms for Data Authentication on Study Results Card.
DOI: 10.5220/0012447000003848
Paper published under CC license (CC BY-NC-ND 4.0)
In Proceedings of the 3rd International Conference on Advanced Information Scientific Development (ICAISD 2023), pages 211-217
ISBN: 978-989-758-678-1
Proceedings Copyright © 2024 by SCITEPRESS – Science and Technology Publications, Lda.
211