scholarly journals PENERAPAN SISTEM KEAMANAN MENGGUNAKAN CRYPTOGRAPHY PADA APLIKASI CHATTING DENGAN MEMODIFIKASI ALGORITMA RIVEST SHAMIR ADLEMAN (RSA)

Compiler ◽  
2014 ◽  
Vol 3 (1) ◽  
Author(s):  
Muttaqin Muttaqin ◽  
Haruno Sajati ◽  
Nurcahyani Dewi Retnowati

Chatting application is an application which used for communication through local network or internet. It can use to make communication to be effective and easy to use but there are several shortage in delivery information process is data security when communication is going on. Using chrypthography with modification Rivest Shamir adleman (RSA) algorithm in encryption process and decryption on packet data which transmited is one of security system which can used in this application then the security of data packet secured. Result from implementation of chatting application which apply chrypthography with modification Rivest Shamir adleman (RSA) algorithm have done in local network and internet able to run smoothly and have done by several testing cases based on certain scenario.  Whereas process testing encryption  and decryption using tools wireshark.

2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Encryption is a technique that transforms a code from an understandable into an incomprehensible code. Many methods can be applied to an encryption process. One such method is RSA. RSA works by appointing on byte values. The value is obtained from character conversion to ASCII code. This algorithm is based on the multiplication of two relatively large primes. Applications of the RSA algorithm can be used in data security. This research provides RSA algorithm application on data security system that can guarantee data confidentiality. RSA algorithm is known as a very secure algorithm. This algorithm works with the number of bits in the search for prime numbers. The larger the bits, the less chance of ciphertext can be solved. The weakness of this method is the amount of ciphertext capacity will be floating in line with the number of prime numbers used. Also, to perform the process of encryption and decryption, RSA requires a relatively long time than other algorithms. The advantage of RSA is that complicated ciphertext is solved into plaintext.


2020 ◽  
Vol 8 (4) ◽  
pp. 475
Author(s):  
Maria Okta Safira ◽  
I Komang Ari Mogi

In this paper two methods are used, namely the vigenere cipher method and the RSA method. The vigenere cipher method is an example of a symmetric algorithm, while RSA is an example of an asymmetric algorithm. The combination of these two methods is called hybrid cryptography which has the advantage in terms of speed during the encryption process. Each process, which is encryption and decryption, is carried out twice, so that security can be ensured. In the process of forming the key used the RSA method. In the encryption process using public keys that have been generated before when the key is formed. This public key is used in sending data to the recipient of a secret message where this key is used for the data encryption process. The Secret key is kept and will be used during the decryption process. There is a system architecture that describes how clients and servers communicate with each other over the internet using the TCP protocol where the client here is an IoT device and the server is a server. 


2019 ◽  
Vol 8 (2) ◽  
pp. 6142-6147

Encryption and Decryption schemes based on applications of Laplace Transforms are unable to provide more security to communicate the information. Rivest, Shemir, Adleman (RSA) Cryptosystem is popular public-key algorithm. This paper provides the conditions that give rise to the RSA Cryptosystem based on the Laplace Transform techniques. The modified RSA cryptosystem is explained with an algorithm. The proposed algorithm is implemented using a high level program and time complexity of the proposed algorithm is tested with RSA cryptosystem algorithms. The comparison reveals that the proposed algorithm enhances the data security as compare with RSA cryptosystem algorithms and application of Laplace Transform for cryptosystem scheme. The statistical analysis for the proposed and existing algorithms is provided


JURTEKSI ◽  
2019 ◽  
Vol 6 (1) ◽  
pp. 1-10
Author(s):  
Sebastian Suhandinata ◽  
Reyhan Achmad Rizal ◽  
Dedy Ongky Wijaya ◽  
Prabhu Warren ◽  
Srinjiwi Srinjiwi

Abstract:Computer data security relies on preventing data theft from irresponsible parties by using cryptography method. Some cryptography algorithms have good and poor performance in encrypting and decrypting data depending on the key types. Therefore the purpose of this research is to measure the performance of the hybrid algorithm, consisting a symmetric keyBlowfish algorithm and an asymmetric key RSA algorithm, in encrypting and decrypting multiple types of data such as documents, photos, audios, and videos. The result is the performance of the hybrid algorithm is almost on par with Blowfish and provides a more secure data encryption and decryption by taking advantage of RSA algorithm. The average encryption performance of hybrid algorithm is 0.85s on document, 1.06s on photo, 3.38s on audio, and 15.56s on video. While the average decryption performance of hybrid algorithm is 1.01s on document, 1.38s on photo, 4.3s on audio, and 27.56s on video.            Keywords:Hybrid cryptography, Data security, Performance, Blowfish, RSA  Abstrak:Keamanan data komputer berhubungan dengan pencegahan dari pencurian data oleh pihak yang tidak bertanggung jawab, salah satu cara pengamanan data komputer yaitu dengan teknik kriptografi. Beberapa metode kriptografi memiliki performa yang baik dan buruk tergantung dengan tipe kuncinya. Maka dari itu, tujuan dari penelitian ini adalah mengukur tingkat kecepatan kriptografi hybrid, terdiri dari algoritma simetris Blowfish dan algoritma asimetris RSA, dengan beberapa tipe data seperti dokumen, foto, audio dan video. Hasil dari penelitian ini adalah algoritma hybrid memiliki performa yang tidak jauh berbeda dari algoritma Blowfish dan membuat proses enkripsi dan dekripsi data lebih aman dengan keunggulan dari algoritma RSA. Rata-rata kecepatan enkripsi algoritma hybrid untuk dokumen 0,85 detik, gambar 1,06 detik, audio 3,38 detik, dan video 15,56 detik. Sedangkan rata-rata kecepatan dekripsi algoritma hybrid untuk dokumen 1,01 detik, gambar 1,38 detik, audio 4,3 detik, dan video 27,56 detik. Kata kunci:Kriptografihybrid, Keamanan data, Performa, Blowfish, RSA 


2020 ◽  
Vol 2 (1) ◽  
pp. 25-34
Author(s):  
Yhopi Suhelna

Humans interact with fellow humans using communication. Not everything that is communicated contains a message so that it can be known by many people, sometimes the communication is confidential so that only certain people can know it. The occurrence of data tapping submitted is certainly a problem if the data is confidential, therefore a data security system is needed so that the data cannot be stolen or changed by tappers or crackers. One solution to secure data is to use cryptography. Cryptography is the science and art of maintaining message security when messages are sent from one media to another without experiencing interference from third parties. Through cryptographic techniques, data can be changed into passwords that are not understood and return them back to the original, this process is called data encryption and decryption. This data security process uses the Digraph Cipher method. Some facilities in the Digraph Cipher method are the keys used in the encryption and decryption process are the same (symmetrical) and the decryption process is the opposite of the encryption process.


2019 ◽  
Vol 6 (6) ◽  
pp. 697
Author(s):  
Nuniek Fahriani ◽  
Harunur Rosyid

<p><strong><span style="font-family: Times New Roman; font-size: small;">Abstrak</span></strong></p><p>Kriptografi (<em>cryptography</em>) merupakan proses keamanan data untuk menjaga pesan (file) agar tidak “diganggu” oleh pihak ketiga. kriptografi memiliki unsur proses, yaitu : enkripsi, dekripsi, dan kunci. Menjadi kebutuhan <em>user</em> untuk menghindari ‘pihak ketiga’ yang bisa merubah, mengambil ataupun menghilangkan data secara fisik atau menjalankan fungsi program yang mengganggu sistem. Tingkat keaslian data menjadi bagian penting didalam sistem keamanan data. Jenis data berupa file yang berpotensi “dirusak” secara illegal tidak hanya berextention .doc bisa saja jenis file yang berextention file video. Untuk menjalankan fungsi dari sistem keamanan data file video, legalitas akses akan data sangat penting untuk<em> secure</em> sehingga tidak berakibat kepada penyalahgunaan hak akses data. Teknik yang digunakan untuk menunjang enkrip dan dekrip file video adalah menerapkan algoritma blowfish didalam implementasinya. Algoritma ini memiliki sistem keamanan yang variabel. Hasil ujicoba menggunakan 6 contoh file extention yang melalui teknik enkrip dan dekrip adalah : file extention .asf, .wmv, .avi, .3pp, .flv, .vob. Dibangun berbasis desktop.</p><p> </p><p><strong><em><span style="font-family: Times New Roman; font-size: small;">Abstract</span></em></strong></p><p><em><span style="font-family: Times New Roman; font-size: small;">Cryptography (cryptography) is a data security process to keep messages (files) from being "disturbed" by third parties. Cryptography has three basic functions, namely: encryption, decryption, and key. Being a user need to avoid 'third parties' who can change, retrieve or delete data physically or run program functions that interfere with the system. The level of authenticity of the data becomes an important part in the data security system. This type of data in the form of files that have the potential to be "tampered" illegally not only with the .doc extension can be the file type with the video file extension. To perform the function of the video file data security system, the legality of access to data is very important to secure so that it does not result in misuse of data access rights. The technique used to support encryption and decryption of video files is to apply the blowfish algorithm in its implementation. This algorithm has a variable security system. The test results using 6 sample file extensions that go through the encryption and decryption process are: file extension .asf, .wmv, .avi, .3pp, .flv, .vob. Desktop based.</span></em></p><p> </p>


Author(s):  
R Rahmadani ◽  
T T A Putri ◽  
S Sriadhi ◽  
R D Sari ◽  
H D Hutahaean

2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document