data grows day by day, posing new problems in terms of information security, such as
unauthorized access to users' credentials and sensitive information. Therefore, this study
employed RSA and ElGamal cryptographic algorithms with the application of SHA-256 for
digital signature formulation to enhance security and validate the sharing of sensitive
information. Security is increasingly becoming a complex task to achieve. The goal of this …