Evaluation of Digital Signatures Using RSA and HMAC Algorithms
Received: 18 August 2025 | Revised: 17 September 2025 and 21 September 2025 and | Accepted: 24 September 2025 | Online: 17 November 2025
Corresponding author: Parinya Natho
Abstract
Nowadays, communication can be conducted at high speed and conveniently through computer networks. In addition, devices in network systems can store data for extended periods. However, communication or storage over the network may lead to security issues or loss of data integrity. Therefore, data security mechanisms should be used to verify and maintain confidentiality and integrity. This research aims to evaluate which algorithm can verify data integrity and identify message authors in the least amount of time. The algorithms studied are Rivest–Shamir–Adleman (RSA), Hash-based Message Authentication Code–Secure Hash Algorithm 256 (HMAC-SHA256), HMAC-SHA384, and HMAC-SHA512, all of which verify data integrity and authenticate message authors. We compared the performance of all algorithms using ten different data sizes ranging from 100 to 1000 MB, with twenty datasets for each size, and evaluated their throughput and bandwidth. The results show that the HMAC-SHA256 algorithm requires the least execution time and therefore demonstrates the highest efficiency. In addition, the algorithm becomes more efficient as the data size increases, followed by HMAC-SHA512, HMAC-SHA384, and RSA, respectively. In future work, studying other algorithms that are capable of verifying data integrity and sender authenticity, such as digital signatures using RSA, Elliptic Curve Cryptography (ECC), and Galois Message Authentication Code (GMAC), or developing applications using HMAC-SHA256 for data integrity and sender authentication, will provide further insights into selecting the most appropriate algorithm for specific applications.
Keywords:
digital signature, Rivest–Shamir–Adleman (RSA), Secure Hash Algorithm (SHA), Hash-based Message Authentication Code (HMAC)Downloads
References
S. Lallouche, "Legal Controls for the Validity of Electronically Signed Documents," RIMAK International Journal of Humanities and Social Sciences, vol. 5, no. 2, pp. 936–953, Mar. 2023. DOI: https://doi.org/10.47832/2717-8293.22.53
E. Barker, "Recommendation for Key Management: Part 1 – General," National Institute of Standards and Technology, NIST Special Publication (SP) 800-57 Part 1 Rev. 5, May 2020.
D. Johnson, A. Menezes, and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," International Journal of Information Security, vol. 1, no. 1, pp. 36–63, Aug. 2001. DOI: https://doi.org/10.1007/s102070100002
J. Chandrashekhara, A. V B, P. H, and R. B R, "A Comprehensive Study on Digital Signature," International Journal of Innovative Research in Computer Science & Technology, vol. 9, no. 3, May 2021, Art. no. IRP1149. DOI: https://doi.org/10.21276/ijircst.2021.9.3.7
A. H. Mansour, "Analysis of RSA Digital Signature Key Generation using Strong Prime," International Journal of Computer, vol. 24, no. 1, pp. 28–36, Feb. 2017.
H. Siregar, E. Junaeti, and T. Hayatno, "Implementation of Digital Signature Using Aes and Rsa Algorithms as a Security in Disposition System af Letter," IOP Conference Series: Materials Science and Engineering, vol. 180, no. 1, Mar. 2017, Art. no. 012055. DOI: https://doi.org/10.1088/1757-899X/180/1/012055
E. S. I. Harba, "Secure Data Encryption Through a Combination of AES, RSA and HMAC," Engineering, Technology & Applied Science Research, vol. 7, no. 4, pp. 1781–1785, Aug. 2017. DOI: https://doi.org/10.48084/etasr.1272
C. E. Castellon, S. Roy, O. P. Kreidl, A. Dutta, and L. Bölöni, "Towards an Energy-Efficient Hash-based Message Authentication Code (HMAC)," in 2022 IEEE 13th International Green and Sustainable Computing Conference, Pittsburgh, PA, USA, 2022, pp. 1–7. DOI: https://doi.org/10.1109/IGSC55832.2022.9969377
S. Suhaili, N. Julai, R. Sapawi, and N. Rajaee, "Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design," Pertanika Journal of Science and Technology, vol. 32, no. 1, pp. 31–44, Nov. 2023. DOI: https://doi.org/10.47836/pjst.32.1.02
H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication," Internet Engineering Task Force, Request for Comments RFC 2104, Feb. 1997. DOI: https://doi.org/10.17487/rfc2104
M. Bellare, R. Canetti, and H. Krawczyk, "Message Authentication using Hash Functions— The HMAC Construction," RSA Laboratories’ CryptoBytes, vol. 2, no. 1, pp. 12–15, 1996. DOI: https://doi.org/10.1007/3-540-68697-5_1
K. Boppudi, "Efficient HMAC Based Message Authentication System for Mobile Environment," Global Journal of Computer Science and Technology, vol. 11, no. 19, pp. 55–59, Jul. 2011.
P. Natho and P. Kuacharoen, "Cloud Storage Security Based on Group Key," Advanced Science Letters, vol. 21, no. 10, pp. 3156–3160, Oct. 2015. DOI: https://doi.org/10.1166/asl.2015.6510
P. Natho, S. Somsuphaprungyos, S. Boonmee, and S. Boonying, "Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm," International Journal of Reconfigurable and Embedded Systems, vol. 13, no. 3, pp. 502–511, Nov. 2024. DOI: https://doi.org/10.11591/ijres.v13.i3.pp502-511
P. Wuttidittachotti and P. Natho, "Improved ciphertext-policy time using short elliptic curve Diffie–Hellman," International Journal of Electrical and Computer Engineering, vol. 13, no. 4, pp. 4547–4556, Aug. 2023. DOI: https://doi.org/10.11591/ijece.v13i4.pp4547-4556
J. Yu, F. Luo, G. Pu, and M. Chen, "A Trade-off Design Approach for Integrating Cybersecurity, Safety, and Other Aspects of Intelligent Connected Vehicles," in Proceedings of China SAE Congress 2022: Selected Papers, Nantong, Jiangsu, China, 2023, pp. 577–592. DOI: https://doi.org/10.1007/978-981-99-1365-7_43
Y. Zhuo, Z. Song, and Z. Ge, "Security Versus Accuracy: Trade-Off Data Modeling to Safe Fault Classification Systems," IEEE Transactions on Neural Networks and Learning Systems, vol. 35, no. 9, pp. 12095–12106, Sep. 2024. DOI: https://doi.org/10.1109/TNNLS.2023.3251999
O. Potii, Y. Gorbenko, and K. Isirova, "Post quantum hash based digital signatures comparative analysis. Features of their implementation and using in public key infrastructure," in 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology, Kharkov, Ukraine, 2017, pp. 105–109. DOI: https://doi.org/10.1109/INFOCOMMST.2017.8246360
M. D. Noel, O. V. Waziri, M. S. Abdulhamid, A. J. Ojeniyi, and M. U. Okoro, "Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions," in 2020 2nd International Conference on Computer and Information Sciences, Sakaka, Saudi Arabia, 2020, pp. 1–6. DOI: https://doi.org/10.1109/ICCIS49240.2020.9257656
M. Ramadhoni and H. Santoso, "Performance Comparison between Signature Cryptography: A Case Study on SNAP Indonesia," Sinkron : jurnal dan penelitian teknik informatika, vol. 7, no. 4, pp. 2327–2335, Oct. 2023. DOI: https://doi.org/10.33395/sinkron.v8i4.12819
W. Uriawan, R. Ramadita, R. D. Putra, R. I. Siregar, and R. Addiva, "Authenticate and Verification Source Files using SHA256 and HMAC Algorithms." Preprints, Jul. 01, 2024. DOI: https://doi.org/10.20944/preprints202407.0075.v1
D. Rana, "Advancements and Comparative Analysis of Digital Signature Algorithms: A Review," International Journal for Research in Applied Science and Engineering Technology, vol. 12, no. 5, pp. 5778–5792, May 2024. DOI: https://doi.org/10.22214/ijraset.2024.62955
Q. Chen, H. Li, S. B. Ariffin, and N. A. B. Mustapa, "A Comprehensive Study on the Homomorphic Encryption for Secure Image Data Processing," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21783–21790, Apr. 2025. DOI: https://doi.org/10.48084/etasr.10007
Downloads
How to Cite
License
Copyright (c) 2025 Parinya Natho, Salinun Boonmee, Natthinee Khongkrairoek

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
