Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)

Muhammad Asghar Nazal(1*), Reza Pulungan(2), Mardhani Riasetiawan(3)

(1) Master Program of Computer Science and Electronics, FMIPA UGM, Yogyakarta
(2) Department of Computer Science and Electronics, FMIPA UGM, Yogyakarta
(3) Department of Computer Science and Electronics, FMIPA UGM, Yogyakarta
(*) Corresponding Author


Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect. One of the developments made by the G-Connect project is about data security; most of the problems verification of the data sent. In previous studies, Keccak and RSA algorithms have implemented for data verification needs. But after a literature study of other algorithms that can make digital signatures, we found what is meant by an algorithm that is better than RSA in rectangular speeds, namely Digital Signature Algorithm (DSA).

DSA is one of the key algorithms used for digital signatures, but because DSA still uses Secure Hash Algorithm (SHA-1) as an algorithm for hashes, DSA rarely used for data security purposes, so Keccak is used instead of the hash algorithm on DSA. Now, Keccak become the standard for the new SHA-3 hash function algorithm. Because of the above problems, the focus of this research is about data verification using Keccak and DSA. The results of the research are proven that Keccak can run on DSA work system, obtained a comparison of execution time process between DSA and RSA where both use Keccak.


Keccak algorithm; RSA algorithms; DSS; DSA

Full Text:



[1]      T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy. United States of America: O’Reilly Media, 2009.

[2]      W. Stallings, Network Security Essentials: Applications and Standards, Fourth. Prentice Hall: Pearson, 2013.

[3]      C. F. Kerry and P. D. Gallagher, “Digital Signature Standard ( DSS ),” Fed. Inf. Process. Stand. Publ., vol. 186–4, no. July, 2013 [Online]. Available:

[4]      F. Kurniawan, A. Kusyanti, and H. Nurwarsito, “Analisis dan Implementasi Algoritma SHA-1 dan SHA-3 pada Sistem Autentikasi Garuda Training Cost,” vol. 1, no. 9, pp. 803–812, 2017 [Online]. Available:

[5]      M. J. Dworkin, “FIPS PUB 202 SHA-3 Standard : Permutation-Based Hash and Extendable-Output Functions,” NIST PUB Ser., vol. 202, no. August 04, 2015 [Online]. Available:

[6]      M. A. Patil and P. T. Karule, “Design and implementation of keccak hash function for cryptography,” in 2015 International Conference on Communications and Signal Processing (ICCSP), 2015, pp. 0875–0878 [Online]. Available:

[7]      R. A. Azdy, “Tanda tangan Digital Menggunakan Algoritme Keccak dan RSA,” Jnteti, vol. 5, no. 3, pp. 184–191, 2016 [Online]. Available:

[8]      H. Gross, D. Schaffenrath, and S. Mangard, “Higher-Order Side-Channel Protected Implementations of KECCAK,” in 2017 Euromicro Conference on Digital System Design (DSD), 2017, pp. 205–212 [Online]. Available:

[9]      H. Mestiri, F. Kahri, B. Bouallegue, M. Marzougui, and M. Machhout, “Efficient countermeasure for reliable KECCAK architecture against fault attacks,” in 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017, pp. 55–59 [Online]. Available:

[10]      A. R. Anggoro, “Studi Mengenai Fully Homomorphic Encryption dan Perkembangannya dari RSA sebagai Enkripsi Homomorfis Populer,” 2009 [Online]. Available:


Article Metrics

Abstract views : 208 | views : 110


Copyright (c) 2019 IJCCS (Indonesian Journal of Computing and Cybernetics Systems)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Copyright of :
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN 1978-1520 (print); ISSN 2460-7258 (online)
is a scientific journal the results of Computing
and Cybernetics Systems
A publication of IndoCEISS.
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Fax: +62274 555133 |

View My Stats1
View My Stats2