Simulation MATERIALS AND METHODS

XX st Month 2013. Vol. x No.x © 2005 - 2013 JATIT LLS. All rights reserved. ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195 5 attorney may not be changed without changing the private key of the signer. Everyone who has public key can check if there is change in electronic power of attorney . 3 Signature on power of attorney must actually made by authorizer and holder. Signature authorizer and holder can be checked from the authorizer and holders public key. If it matches, then of course the signature belongs to the authorizer and holder. 4 The authorizer and holder can not deny the signatures they have created. When they sign the electronic power of attorney, then all parties who have the authorizer and holder s public key can easily check the signatures. Authorizer and holder certainly can not deny the signature they have created themselves. The authorizer and holder generate public and private key together and that key are paired. 5 Signature authorizer and holder must be distinguished. Signature authorizer and holder can be distinguished from each private key. The authorizer and holders private key generated by each of authorizer and holder without any interference from the other party . 6 The third party must be convinced that it is true authorizer give the authority to the holder. Electronic power of attorney signed two times, by the authorizer and holder. Third party verify the signature and the power of attorney through the public key authorizer and holder and also the message file itself. Menezes 1997 said that the security of the DSA relies on two distinct but related discrete logarithm problems. One is the logarithmproblem in p , where the powerful index-calculus methods apply; the other is the logarithm problem in the cyclic subgroup of order q, where the best current methods run in “square-root” time.

5. CONCLUSION

Power of attorney with paper media can be replaced with electronic power of attorney. Signature on a power of attorney in paper media was replaced with a digital signature. Protocols electronic power of attorney created using DSA algorithms according to a power of attorney in force in Indonesia. Electronic power of attorney protocols are designed to meet the security criteria of power of attorney. REFERENCES: [1] P. Shiralkar and B. S. Vijayaraman, “Digital Signature : Application Development Trends In E- Business,” Journal of Electronic Commerce Research, vol. 4, no. 3, pp. 94-101, 2003. [2] J. Seberry, V. To, and D. Tonien, “A New Generic Digital Signature Algorit hm,” University of Wollongong Research Online, vol. 3, pp. 221-237, 2011. [3] K. K. Agrawal, R. Patira, and K. Madhur, “A Digital Signature Algorithm based on x th Root Problem,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 11, pp. 61- 65, 2012. [4] S. Vishnoi and V. Shrivastava, “A new Digital Signature Algorithm based on Factorization and Discrete Logarithm problem,” International Journal of Computer Trends and Technology, vol. 3, no. 4, pp. 653-657, 2012. [5] P. Kuppuswamy, P. M. Appa, and S. Q. Y. Al- khalidi, “A New Efficient Digital Signature Scheme Algorithm based on Block cipher,” IOSR Journal of Computer Engineering, vol. 7, no. 1, pp. 47-52, 2012. [6] T. Lakshmanan and M. Muthusamy, “A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes,” The International Arab Journal of Information Technology, vol. 9, no. 3, pp. 262-267, 2012. [7] M. Swarnkar and S. Verma, “Count based Secured Hash Algorithm .,” IOSR Journal of Computer Engineering, vol. 6, no. 6, pp. 49- 51, 2012. [8] S. Verma and B. K. Sharma, “A New Proxy Blind Signature Scheme Based on DLP,” International Journal of Information and Network Security, vol. 1, no. 2, pp. 60-66, 2012.