Sa'aadah Sajjana Carita’s research while affiliated with Politeknik Indonesia and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (10)


Revolutionizing Security: A Dynamic Threshold Signature Scheme with Improved ECDSA
  • Conference Paper

December 2024

M. Ikhsan Mubarok

·

Mareta Wahyu Ardyani

·

Nadia Paramita Retno Adiati

·

Sa'Aadah Sajjana Carita






Figure 6. Experiment Results
MODIFICATION OF POLLARD RHO ALGORITHM USING NEGATION MAPPING
  • Article
  • Full-text available

December 2022

·

54 Reads

·

3 Citations

BAREKENG JURNAL ILMU MATEMATIKA DAN TERAPAN

El Gamal encryption was introduced in 1985 and is still commonly used today. Its hardness is based on a discrete logarithm problem defined over the finite abelian cyclic group group chosen in the original paper was but later it was proven that using the group of Elliptic Curve points could significantly reduce the key size required. The modified El Gamal encryption is dubbed its analog version. This analog encryption bases its hardness on Elliptic Curve Discrete Logarithm Problem (ECDLP). One of the fastest attacks in cracking ECDLP is the Pollard Rho algorithm, with the expected number of iterations where is the number of points in the curve. This paper proposes a modification of the Pollard Rho algorithm using a negation map. The experiment was done in El Gamal analog encryption of elliptic curve defined over the field with different values of small digit . The modification was expected to speed up the algorithm by times. The average of speed up in the experiment was 1.9 times.

Download

Modifikasi Tanda Tangan Digital Pada Skema Esign Berbasis Kurva Eliptik

July 2022

·

1 Read

·

1 Citation

Jurnal Ilmiah SINUS

Digital signature has an important role in the digital era, where more and more people are joining the paperless life. Many cryptographic researchers support digital development by creating cryptographic schemes that are safe to use, and one of them is digital signature. This paper proposes a digital signature scheme based on an elliptic curve defined over with , where and are private keys of prime number elements. This scheme utilizes the advantages of elliptic curve cryptography in terms of security by using points that satisfy the elliptic curve equation. Additionally, the shorter key size increases the speed, making this scheme faster in signature values generation and verification process.This research was conducted to determine the differences between the modified ESIGN scheme based on elliptic curve and the original ESIGN scheme. The process of finding the point on the ring , with a large , resulted in a more complex key generation algorithm. However, the selection of two points in this key generation is precomputed. This means the actual signature value generation algorithm took significantly less time than the original. This is one of the advantages of the proposed scheme.


Finding Collisions in Block Cipher-based Iterative Hash Function Schemes Using Iterative Differential

September 2021

·

30 Reads

·

2 Citations

IAENG International Journal of Computer Science

Hash function has a fundamental role in modern cryptography as a tool to ensure integrity services in the exchange of digital information. The hash function allows one to easily verify whether or not an input data is mapped to a given or stored hash value. One type of hash function is one that uses only messages as input values called Modification Detection Codes (MDCs). Good MDCs must meet the preimage resistance, second-preimage resistance, and collision resistance properties. One type of MDCs hash function is the Preneel-Govaerts-Vandewalle (PGV) scheme, which is one of the most common iterative MDCs utilizing block cipher as its compression function. PGV has 64 schemes for building hash functions that have the property of collision resistance, which is the difficulty of finding two different inputs that have the same hash value. Of the 64 schemes, it is claimed that there are 12 secure schemes, even though there are no formal proofs of the claim. In this study, we showed that iterative differential characteristics can be utilized for finding collision on the 12 claimed-to-be-secure schemes of PGV hash function.


Serangan Aljabar pada Algoritme S-IDEA dan Miniatur S-IDEA

June 2021

·

11 Reads

Info Kripto

Serangan aljabar dapat dilakukan dalam dua tahapan yaitu mendapatkan sistem persamaan polinomial dan menentukan solusi dari sistem persamaan polinomial tersebut. Pada penelitian ini dilakukan serangan aljabar pada S-IDEA. Proses enkripsi satu round S-IDEA terdiri dari 14 langkah sedangkan sampai dengan Langkah ke-7 sudah diperoleh persamaan polinomial yang besar yaitu terdiri dari 4.721 monomial. Oleh karena keterbatasan sumber daya, dibuat miniatur S-IDEA agar serangan aljabar dapat dilakukan pada setiap langkah secara utuh. Algoritme miniatur S-IDEA terdiri dari 2,5 round yang setiap round-nya terdiri dari 14 langkah seperti halnya S-IDEA. Proses serangan aljabar pada miniatur S-IDEA menghasilkan 8 persamaan polinomial dengan monomial maksimal yang diperoleh yaitu sebanyak 1.109 monomial. Penentuan solusi dari persamaan polinomial yang diperoleh dilakukan dengan metode XL algorithm dan basis Gröbner. Metode XL algorithm dilakukan sampai tahap 4 dari 5 tahap, yaitu tahap linierisasi. Tahap linierisasi menghasilkan 136 persamaan yang didalamnya terdapat 1512 monomial. Konstanta dari persamaan linier tersebut dapat direpresentasikan ke dalam bentuk matriks berukuran 1512×136. Besarnya sistem persamaan hasil linierisasi yang diperoleh menyebabkan nilai kunci belum bisa didapatkan secara langsung melainkan harus dilakukan analisis lebih lanjut mengenai persamaan mana saja yang perlu digunakan untuk tahap selanjutnya pada XL algorithm. Sementara itu penentuan solusi dengan basis Gröbner menghasilkan 34 persamaan baru yang cukup panjang, sehingga nilai kunci belum dapat diperoleh secara langsung.

Citations (2)


... The set of points of an elliptic curve forms a group under addition operation. This group can be used as a building block of a key exchange scheme, ElGamal encryption [17], and many cryptographic schemes and algorithms. ...

Reference:

ON THE SECURITY OF GENERALIZED MULTILINEAR MAPS BASED ON WEIL PAIRING
MODIFICATION OF POLLARD RHO ALGORITHM USING NEGATION MAPPING

BAREKENG JURNAL ILMU MATEMATIKA DAN TERAPAN

... Collision resistance is a property of a hash function that makes it extremely difficult to find two distinct messages that produce the same hash output [42]. A collision attack known as the Yuval's birthday attack will be employed to assess the collision resistance property of the Hortex algorithm. ...

Finding Collisions in Block Cipher-based Iterative Hash Function Schemes Using Iterative Differential

IAENG International Journal of Computer Science