On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages CAUCHY –Jurnal Matematika Murni dan Aplikasi Volume 7(3) (2022), Pages 483-492 p-ISSN: 2086-0382; e-ISSN: 2477-3344 Submitted: December 20, 2021 Reviewed: March 07, 2022 Accepted: March 28, 2022 DOI: http://dx.doi.org/10.18860/ca.v7i3.14434 On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages Juhari*, Mohamad Febry Andrean Mathematics Study Program, Faculty of Science and Technology, Maulana Malik Ibrahim State Islamic University Malang, Indonesia Email: juhari@uin-malang.ac.id* ABSTRACT Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field used, one of which is the infinite field prima (FP where p > 3). Elliptic curve cryptography can be used for multiple protocol purposes, digital signatures, and encryption schemes. The purpose of this study is to determine the process of hiding encrypted messages using the Noiseless Steganography method as well as the generation of private keys and public keys and the process of verifying the validity of the Elliptic Curves Cryptography Digital Signature Algorithm (ECDSA). The result of this thesis is that a line graph is obtained that store or hides a message using the steganography method and a message authenticity from the process of key generation and verification of validity using the ECDSA method. By selecting three samples consisting of one test sample and two differentiating samples, a line graph, an MD5 hash value, and a value at the point are obtained M(r, s) different. Successively obtained values M(r, s) to message “Matematika 2018”, “MATEMATIKA 2018”, and “2018 matematika” are M(94,67), M(15,17), and M(9,16). The discussion in this thesis only covers the elliptic curves on prime finite field. So, for the next thesis, the next researcher can do a discussion about the elliptic curve on the finite field (F2m ) or the application of elliptic curve cryptography and other steganography methods. Keywords: cryptography; steganography; algorithm; elliptic curve; digital signature INTRODUCTION The form of communication in this era has gone through several stages of development. This can be clearly seen from the way people use various digital devices as a means of communication. Thanks to digital communication devices, people can communicate remotely through voice, text, images, and video. Different types of messages sent only to http://dx.doi.org/10.18860/ca.v7i3.14434 mailto:juhari@uin-malang.ac.id* On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages Juhari 484 certain parties are confidential. Therefore, in sending a message or information, it is necessary to pay attention to its authenticity or authenticity so that the message you want to convey is received by the right person an algorithm is needed to maintain the authenticity of the message or information, namely Elliptic Curves Cryptography Digital Signature Algorithm [1], [2]. A cryptographic value that depends on the message body and the sender of the message is called a digital signature or digital signature. Digital signatures generate different signatures on each document. It is a digital signature taken from the document itself [3]. Basically, the use of digital signature functions the same as signatures in printed documents, namely as a process for authentication [4]. The use of a digital signature combines two cryptographic algorithms at once, namely the first one-way hash function algorithm that will produce a message digest, and the second algorithm is the public key algorithm used to encrypt the message digest. A hash function is a function that accepts an arbitrary-length string input and then compresses it into a fixed-sized message digest [5]. One of the one-way hash functions used is MD5 (message digest 5) which is an improvement over MD4 [6]. Broadly speaking, md5 manufacturing has four steps, namely the addition of bits of the blocker, the addition of the original message length value, initialization of the MD buffer, and message processing [7]. The public key algorithm in its implementation uses a pair of keys that are a public key that can be deployed, and a private key known to the owner only. Elliptic Curve Cryptography (ECC) is cryptography that operates on elliptic curve domains. In the process of working on cryptographic algorithms, elliptic curves require mathematical concepts, namely abstract algebra including group theory, rings, and fields [8]. In addition to abstract algebraic concepts, there is a theory of numbers, especially in the modular concept of arithmetic. In the application of cryptography, one of them is the elliptic curve digital signature algorithm or elliptic Curve digital Signature algorithm which is based on the ElGamal Signature algorithm. The result of this algorithm is in the form of the authenticity of a message M. The method for keeping a message confidential is not just by using cryptography [9]. Another technique that can be used besides cryptography is steganography [10]. Steganography can be viewed as a complement to cryptography because they complement each other. The security of a message can be improved by combining cryptography and steganography [11]. In general, the technique used is to encrypt messages first with cryptographic algorithms, then encrypted messages are hidden in other media (voice, text, video, and images) by steganography methods [12]. If the concealment of the message on conventional steganography can degrade the quality of the cover, then the concealment of the message on the Noiseless Steganography or NoStega methods does not cause damage. Some research on elliptic curve cryptography has been done by Annisa Hardiningsih HR, creation and verification of digital signatures using the MD5 hash function and the RSA algorithm cryptography on a document. The results show that each electronic document produces a different signature, even though it is signed by the same person and electronic documents that have not changed their contents result in the decryption value of the digital signature and message digest modulo n of the same value [13]. In previous studies has been discussed related elliptic curve cryptography and is given a simple example of the use of elliptic curve cryptography in the ElGamal encoding process to make it easier to understand [14]. The study only discussed the application of elliptic curve cryptography to the ElGamal encoding process only and was limited to finite fields Fp. On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages Juhari 485 In previous studies discusses the level of security and performance of cryptographic algorithms Elliptic Curves Cryptography Digital Signature Algorithm (ECDSA) or algorithms Rivest-Shamir-Adleman (RSA) [15]. So that this research will be carried out a combination of cryptography and steganography methods without the need for a cover to hide the message. The steganography method used is Noiseless Steganography (NoStega) and the cryptographic method used is the Elliptic Curves Cryptography Digital Signature Algorithm (ECDSA). METHOD The stages of this study consist of five steps. The steps are as follows: 1. Represents message 𝑀 into 8-bit ASCII code. 2. Perform a message concealment using the Steganography method. 3. Determining the equation of an elliptic curve on a primed finite field 𝐹𝑝. 4. Define elements of an ellipse group a. Calculating the modulo squared residual value 𝑝. b. Comparing it with the value of 𝑦2 = 𝑥3 + 𝑎𝑥 + 𝑏(𝑚𝑜𝑑 𝑝). c. Specifying values 𝑃(𝑥, 𝑦) on an elliptic curve as a generator of the elliptic group. d. Determining a base point 𝐵(𝑥, 𝑦) selected from the ellipse group. 5. Determining the elliptic curve algorithm using the Elliptic Curves Cryptography Digital Signature Algorithm a. Performs the process of generating the public key and private key of the Elliptic Curves Cryptography Digital Signature Algorithm. b. Perform the signature generation process of elliptic curves cryptography digital signature algorithm. c. Verify the validity of the Elliptic Curves Cryptography Digital Signature Algorithm signature. RESULTS AND DISCUSSION Application of Steganography Method to a Message Change a message 𝑀 = ” Matematika 2018” to a binary representation (each character is converted into an 8-bit ASCII code) to 01001101 01100001 01110100 01100101 01101101 01100001 01110100 01101001 01101011 01100001 00100000 00110010 00110000 00110001 00111000 Next, it will be converted back the above bit groups to decimal values 77 97 116 101 109 97 116 105 107 97 32 50 48 49 56 Then a graph will be made using the decimal value above, for example, the value states the number of COVID-19 cases in Pasuruan Regency. On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages Juhari 486 Picture 1. Line Graph That Hides Messages “Matematika 2018” Elliptic Curve Equation in Primed Finite Field 𝑭𝒑 For example, given 𝐺𝐹(97) and selected 𝑎 = 1 and 𝑏 = 3 with 𝑎 and 𝑏 fulfill 4(1)3 + 27(3)2 = 247 ≢ 0 (𝑚𝑜𝑑 97), so that the elliptic curve equation is obtained [16]: 𝐺𝐹(97): 𝑦2 = 𝑥3 + 𝑥 + 3 To determine the points in an elliptic curve 𝐺𝐹(97), using the method of searching the set of modulo quadratic residues. That is by looking for all elements of the modulo 97 quadratic residual set annotated with 𝑄𝑅97, using all the elements of the set 𝐺𝐹(97) as a 𝑦point that is then squared, and the result of the square of the 𝑦 point is in modulo with 97, then the set is obtained 𝑄𝑅(97). Modulo Prima Elliptic Group Elements 𝑮𝑭(𝟗𝟕) Determined all points 𝑃(𝑥, 𝑦) on an elliptic curve 𝑦2 ≡ 𝑥3 + 𝑥 + 3 (𝑚𝑜𝑑 97) by 𝑥 and 𝑦 equation side 𝐺𝐹(97). Then it is known the element inside 𝐺𝐹(97) is {0, 1, 2, … , 96}. Performed calculations for all points on the curve 𝑦2 by substituting elements 𝐺𝐹(97) elliptic curve equation. a. Find for modulo quadratic residues 𝟗𝟕(𝑸𝑹𝟗𝟕) Table 1. Modulo Quadratic Residue 97 𝒚 ∈ 𝑮𝑭𝟗𝟕 𝒚 𝟐(𝒎𝒐𝒅 𝟗𝟕) 𝑸𝑹𝟗𝟕 0 y2(mod 97) 0 1 y2(mod 97) 1 2 y2(mod 97) 4 3 y2(mod 97) 9 ⋮ ⋮ ⋮ 93 y2(mod 97) 16 94 y2(mod 97) 9 95 y2(mod 97) 4 96 y2(mod 97) 1 On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages Juhari 487 b. Determining the value of 𝒚𝟐 ≡ 𝒙𝟑 + 𝒙 + 𝟑 (𝒎𝒐𝒅 𝟗𝟕) 𝑦2 is the value of the predetermined elliptic curve equation in table 1. By substituting each value 𝑥 ∈ 𝐺𝐹97 to equations 𝑦 2 ≡ 𝑥3 + 𝑥 + 3 (𝑚𝑜𝑑 97) then the results are obtained in Table 2. Table 2. Value y2 ≡ x3 + x + 3 (mod 97) 𝒙 ∈ 𝑮𝑭𝟗𝟕 𝒚 𝟐 0 3 1 5 2 13 ⋮ ⋮ 94 70 95 90 96 1 c. Determining sequential pairs (𝒙, 𝒚) ⊂ 𝑬𝟗𝟕 Based on table 2, for 𝑥 = 1 obtained value 𝑦2 = 13 + 1 + 3 (𝑚𝑜𝑑 97) = 5. Once equalized against the modulo quadratic residual value of 97 in the table 2, apparently 𝑦2 = 5 also found in 𝑄𝑅97 hence for value 𝑦1 = 11 and 𝑦2 = 18. Then get a pair of dots (𝑥, 𝑦) = (1,11) dan (𝑥, 𝑦) = (1,18) which are the elements of the ellipse group 𝐸97(1,3). Not all 𝑥 ∈ 𝐺𝐹97 will generate a value 𝑦 2 of elements 𝑄𝑅97. For example, for 𝑥 = 0 obtained value 𝑦2 = 03 + 0 + 3 (𝑚𝑜𝑑 97) = 3, While 𝑦2 not contained on 𝑄𝑅97. So, for 𝑥 = 0 no value 𝑦 that filled. Picture 2. Elliptic Curve Point 𝐺𝐹(97) So, the points contained on the elliptic curve are 96 points, if coupled with the O point in the infinity, then the points on the elliptic curve form a group with element 𝑛 = 97. On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages Juhari 488 Elliptical Group Generator 𝑮𝑭(𝟗𝟕) Let’s 𝑃 ∈ 𝐺𝐹(97), then 𝑃 called generator or generator of 𝐺𝐹(97) if each element 𝐺𝐹(97) can be written as a rank of 𝑃 or 𝐺𝐹(97) = {𝑃𝑛 |𝑛 ∈ 𝐺𝐹(97)} where 𝐺𝐹(97) is a prime number with elements in the galois field {0,1,2, . . . ,36}. In the previous discussion, 96 points have been obtained 𝑃(𝑥, 𝑦) so that the generator of the elliptic group 𝐺𝐹(97) can be searched by summing and doubling the points of the ellipse curve with the following formula: a. Addition Elliptic Curve Point Let’s 𝑃(𝑥1, 𝑦1) ∈ 𝐸(𝐹𝑝), 𝑄(𝑥2, 𝑦2) ∈ 𝐸(𝐹𝑝), and 𝑃 ≠ 𝑄, then 𝑃 + 𝑄 = (𝑥3, 𝑦3) where 𝑥3 = 𝜆2 − 𝑥1 − 𝑥2, 𝑦3 = 𝜆(𝑥1 − 𝑥3) − 𝑦1, and 𝜆 = 𝑦2−𝑦1 𝑥2−𝑥1 b. Doubling a point Let’s 𝑃 = (𝑥1, 𝑦1) ∈ 𝐸(𝐹𝑝) then 𝑃 + 𝑃 = 2𝑃 = (𝑥3, 𝑦3) where 𝑥3 = 𝜆 2 − 2𝑥1, 𝑦3 = 𝜆(𝑥1 − 𝑥3) − 𝑦1, and 𝜆 = 3𝑥1 2+𝑎 2𝑦1 Of the 96 points of the curve that exist, it turns out that all of these points are generators of the elliptic group 𝐺𝐹(97). Elliptic Curves Cryptography Digital Signature Algorithm There are three digital signature elliptic curve algorithms used: 1. Generation of Public Key and Private Key Elliptic Curves Cryptography Digital Signature Known equations of elliptic curves over infinity fields 𝐺𝐹(𝑝) that is 𝑦2 = 𝑥3 + 𝑥 + 3 (𝑚𝑜𝑑 97). From the equation obtained pairs of points of the elliptical curve of 96 points and one infinite point which can be seen in the appendix in the table. For the generation of public and private keys a value is required 𝑃𝐴 and 𝑃𝐵 for each of the two sides. Sender generates its public and private keys as follows: a. Select an integer 𝑥 = 3 b. Count 𝑃𝐴 = 𝑥 ∙ 𝐵 𝑃𝐴 = 3 ∙ (0,10) 𝑃𝐴 = 2(0,10) + (0,10) By using the formula for doubling the points of the elliptic curve described earlier. The following will be shown the calculation process for the values of 2𝑃 and 3𝑃: a. Let’s 𝑃(𝑥1 = 0, 𝑦1 = 10) ∈ 𝐺𝐹(97), then 𝑃 + 𝑃 = 2𝑃 = (𝑥3, 𝑦3) where: 𝑥3 = ( 3𝑥1 2+𝑎 2𝑦1 ) 2 − 2𝑥1 = ( 3 ∙ 02 + 1 2 ∙ 10 ) 2 − 2 ∙ 0 = ( 1 20 ) 2 − 0 = (1 ∙ 20−1)2 − 0 = (1 ∙ 34)2 − 0 = 342(𝑚𝑜𝑑97) = 89 𝑦3 = ( 3𝑥1 2+𝑎 2𝑦1 ) (𝑥1 − 𝑥3) − 𝑦1 On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages Juhari 489 = ( 1 20 ) (0 − 89) − 10 = 34 ∙ (−89) − 10 = 34 ∙ 8 − 10 = 78 − 10 = 68 (𝑚𝑜𝑑97) = 68 So 2𝑃 = (89,68) b. Let’s 𝑃(𝑥1 = 0, 𝑦1 = 10) ∈ 𝐺𝐹(97), 𝑄(𝑥2 = 89, 𝑦2 = 68) ∈ 𝐺𝐹(97), and 𝑃 ≠ 𝑄, then 𝑃 + 𝑄 = (𝑥3, 𝑦3) where: 𝑥3 = ( 𝑦2−𝑦1 𝑥2−𝑥1 ) 2 − 𝑥1 − 𝑥2 = ( 68−10 89−0 ) 2 − 0 − 89 = ( 58 89 ) 2 − 89 = (58 ∙ 89−1)2 − 89 = (58 ∙ 12)2 − 89 = 172 − 89 = 6(𝑚𝑜𝑑 97) = 6 𝑦3 = ( 𝑦2−𝑦1 𝑥2−𝑥1 ) (𝑥1 − 𝑥3) − 𝑦1 = 17 ∙ (0 − 6) − 10 = 17 ∙ (−6) − 10 = (17 ∙ 91) − 10 = 82 𝑚𝑜𝑑 97 = 82 So 3𝑃 = (6,82) Then obtained value 𝑃𝐴 = (6,82). 𝑃𝐴 = (6,82) is the Sender public key and 𝑥 = 3 the private key. Recipient generates her private key and public key as follows: a. Select any integer 𝑦 = 2 b. Count 𝑃𝐵 = 𝑦 ∙ 𝐵 𝑃𝐵 = 2 ∙ (0,10) By using the formula of doubling the points of the ellipse curve. Let’s 𝑃(𝑥1 = 0, 𝑦1 = 10) ∈ 𝐺𝐹(97), then 𝑃 + 𝑃 = 2𝑃 = (𝑥3, 𝑦3) where: 𝑥3 = ( 3𝑥1 2+𝑎 2𝑦1 ) 2 − 2𝑥1 = ( 3 ∙ 02 + 1 2 ∙ 10 ) 2 − 2 ∙ 0 = ( 1 20 ) 2 − 0 = (1 ∙ 20−1)2 − 0 = (1 ∙ 34)2 − 0 = 342(𝑚𝑜𝑑97) = 89 𝑦3 = ( 3𝑥1 2+𝑎 2𝑦1 ) (𝑥1 − 𝑥3) − 𝑦1 = ( 1 20 ) (0 − 89) − 10 = 34 ∙ (−89) − 10 = 34 ∙ 8 − 10 = 78 − 10 = 68 (𝑚𝑜𝑑97) = 68 Then obtained value 𝑃𝐵 = (89,68). So, 𝑃𝐵 = (89,68) is Recipient's public key and 𝑦 = 2 the private key. 2. Elliptic Curves Cryptography Digital Signature Generate Procedure Sender generates a digital signature for a message M = “Matematika 2018” as follows: a. Choose a random integer 𝑘, whose value lies in the hose [1, 𝑝 − 1], will be selected 𝑘 = 10 On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages Juhari 490 b. Count 𝑘 ∙ 𝐵 = (𝑥1, 𝑦1) and 𝑟 = 𝑥1 𝑚𝑜𝑑 𝑝. If 𝑟 = 0 then back to the stage 1. 𝑘 ∙ 𝐵 = 10 ∙ (0,10) = 5 ∙ (0,10) + 5 ∙ (0,10) = (3,18) + (3,18) = (94,19) So, 𝑟 = 𝑥1 = 94 𝑚𝑜𝑑 97 = 94 c. Count 𝑘−1𝑚𝑜𝑑 𝑝 𝑘−1 𝑚𝑜𝑑 𝑝 = 10−1 𝑚𝑜𝑑 97 = 68 d. Calculate the hash value of 𝑀, that is 𝑒 = 𝐻(𝑀). With the message conveyed “Matematika 2018” then obtained 𝑒 = 𝑎6𝑏𝑑3𝑑71𝑒𝑐𝑓𝑑38391462𝑑𝑏𝑒𝑑𝑒𝑒65𝑏𝑎02 (Hexadecimal) 𝑒 = 22163443765967189024324661321080961280 (Decimal) e. Count 𝑠 = 𝑘−1(𝑒 + 𝑥 ∙ 𝑟)𝑚𝑜𝑑 𝑝. If 𝑠 = 0, then repeat to the stage 1. 𝑠 = 10−1(221634437659671890243246613210809612802 + 3 ∙ 94) 𝑚𝑜𝑑 97 𝑠 = 67 Then obtained a message 𝑀 be (94,67) from the generation of digital signatures. 3. Elliptic Curves Cryptography Digital Signature Verification Procedure Recipient will verify the digital signature (𝑟, 𝑠) from Sender as follows: a. Verify that 𝑟 and 𝑠 located inside the hose [1, 𝑝 − 1]. b. Retrieve the Sender public key, which is 3𝑃𝐴. c. Recipient calculates the Hash value of 𝑀, that is 𝑒 = 𝐻(𝑀). 𝑒 = 𝑎6𝑏𝑑3𝑑71𝑒𝑐𝑓𝑑38391462𝑑𝑏𝑒𝑑𝑒𝑒65𝑏𝑎02 (Hexadecimal) 𝑒 = 221634437659671890243246613210809612802(Desimal) d. Count 𝑤 = 𝑠−1 𝑚𝑜𝑑 𝑝 𝑤 = 67−1 𝑚𝑜𝑑 97 = 42 e. Count 𝑢1 = 𝑒 ∙ 𝑤 𝑚𝑜𝑑 𝑝 and 𝑢2 = 𝑟 ∙ 𝑤 𝑚𝑜𝑑 𝑝 𝑢1 = 𝑒 ∙ 𝑤 𝑚𝑜𝑑 𝑝 𝑢1 = (221634437659671890243246613210809612802 ∙ 42)𝑚𝑜𝑑 97 𝑢1 = 0 Thus, the value of the value is obtained 𝑢1 = 0 𝑢2 = 𝑟 ∙ 𝑤 𝑚𝑜𝑑 𝑝 𝑢2 = 94 ∙ 42 𝑚𝑜𝑑 97 = 68 Thus, the value of the value is obtained 𝑢2 = 68 f. Count (𝑥1, 𝑦1) = 𝑢1 ∙ 𝐵 + 𝑢2 ∙ 𝑃𝐴 (𝑥1, 𝑦1) = 𝑢1 ∙ 𝐵 + 𝑢2 ∙ 𝑃𝐴 (𝑥1, 𝑦1) = 0 ∙ (0,10) + 68 ∙ (6,82) (𝑥1, 𝑦1) = 0 + (30(6,82) + 30(6,82) + 8(6,82)) (𝑥1, 𝑦1) = 0 + ((93,41) + (93,41) + (39,71)) (𝑥1, 𝑦1) = 0 + (26,57) + (39,71) (𝑥1, 𝑦1) = 0 + (94,19) (𝑥1, 𝑦1) = (94,19) g. Count 𝑣 = 𝑥1 𝑚𝑜𝑑 𝑝 On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages Juhari 491 𝑣 = 𝑥1 𝑚𝑜𝑑 𝑝 𝑣 = 94 𝑚𝑜𝑑 97 = 94 From the calculation of the value 𝑣 in the procedure of verifying the validity of obtaining the value 𝑣 = 94. In the previous procedure obtained the value 𝑟 = 94 on point 𝑀(94,67). If, 𝑣 = 𝑟 = 94 then the valid signature or authenticity of a message received is correct. CONCLUSION The steganography method can be used to hide a secret message in another message as a cover so that the existence of the secret message cannot be detected. As well as the use of the Elliptic Curves Digital Signature Algorithm method on a message to identify or authenticate the authenticity of a message sent and received correctly from the real sender and recipient. REFERENCES [1] R. Munir, Kriptografi, Bandung: Informatika Bandung, 2019. [2] R. A. M. M.-K. Mojtaba Bisheh-Niasar, "Cryptographic accelerators for digital signature based on Ed25519," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 29, no. 7, pp. 1297-1305, 2021. [3] P. Kitsos, N. Sklavos and O. Koufopavlou, "An Efficient Implementation Of The Digital Signature Algorithm," 2016. [4] J. Tian, G. Xiong, Z. Li and G. Gou, "A Survey of Key Technologies for Constructing Network Covert Channel. Security and Communication Networks," pp. 1-20, 2020. [5] L. K. A. C. M. &. L. C. Demir, "The pitfalls of hashing for privacy," IEEE Communications Surveys & Tutorials, vol. 20(1), pp. 551-565, 2017. [6] Z. E. S. B. W. G. &. A. E. Rasjid, " A review of collisions in cryptographic hash function used in digital forensic tools," Procedia computer science, pp. 381-392, 2017. [7] N. Hayati, A. Budiman and M. Sharif, "Implementasi Algoritma RC4A dan MD5 untuk Menjamin Confidentiality dan Integrity pada File Teks," vol. 1, p. 7, 2017. [8] W. L. T. M. C. P. L. &. R. J. Castryck, "CSIDH: an efficient post-quantum commutative group action," pp. (pp. 395-427), 2018. [9] P. G. A. K. T. M. C. &. Y. V. K. Dixit, "Traditional and hybrid encryption techniques: a survey. In Networking communication and data knowledge engineering," pp. (pp. 239- 248), 2018. [10] M. S. R. M. S. M. L. S. A. H. M. M. &. A. H. M. Taha, "Combination of steganography and cryptography: A Short Survey," vol. 518, 2019. [11] H. T. S. &. H. H. T. ALRikabi, "Enhanced data security of communication system using combined encryption and steganography," vol. 145, p. 15(16), 2021. [12] I. J. P. P. V. P. J. &. H. B. Kadhim, "Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing," vol. 335, pp. 299-326, 2019. On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages Juhari 492 [13] H. A, "Implementasi Fungsi Hash MD5 dan Kriptografi Algoritma RSA Pada Pembuatan Tanda Tangan Digital," 2021. [14] X. G. D. L. N. L. B. G. M. &. Q. C. Duan, "A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network," no. IEEE Access, 2020. [15] D. P. &. S. A. K. Timothy, "A hybrid cryptography algorithm for cloud computing security," In 2017 International conference on microelectronic devices, circuits and systems (ICMDCS), no. IEEE, pp. (pp. 1-5), 2017. [16] W. Stallings, Criptography and Net Securitywork Principles and Practice, Pearson Education Limited, 2017.