scholarly journals IMPLEMENTASI TEKNIK KRIPTOGRAFI RSA UNTUK PENGAMANAN DATA PENGIRIMAN SMS

2020 ◽  
Vol 5 (1) ◽  
pp. 61-66
Author(s):  
Ainafatul Nur Muslikah ◽  
Hardiana Riski Riswanto ◽  
Khamaida Safinah ◽  
Khadijah Fahmi Hayati Holle

Message sending is one activity that is often used by everyone. However, security in this message delivery system needs to be wary of spying or message piracy during the process of sending messages. Surely someone who sent the message does not know if someone's personal message has been stolen. With this initiative builds a security message using cryptographic RSA algorithm where the message sender or recipient of the message can send the message safely without being known to the message hijacker or spy. Cryptography that uses the RSA algorithm to secure messages. This RSA algorithm message will be decrypted with the public key and to encrypt the message. This application was built on the Android platform because the dominant person has an Android smartphone with a system that runs the length of the message character does not affect the speed at the time of sending the message to the recipient, and there is no limit on the length of the message character during the encryption process so that any length of the massage character can be encrypted well.

2018 ◽  
Vol 10 (2) ◽  
Author(s):  
Yuza Reswan ◽  
Dedy Agung Prabowo

ABSTRACTIt is now commonplace that secrecy must be truly enhanced and tightened as it weighs the emergence of the latest technology that is growing rapidly. Of course an agency, group, or individual have data that is confidential and do not want to be known by other parties hence the need for a system capable of securing the data. For this reason this research aims to create Cryptography application by applying a combination of Hill Cipher and RSA algorithm, Cryptography is also called coding language and I apply Hill Cipher because it is a classical method that uses multiplication for each encoded character while RSA is a modern method that has 2 keys ie key public and secret key where the public key is used for encryption and secret key to retranslate the original form. By applying a combination of classical and modern methods it can be more secure so it is more difficult to be solved by unwanted parties.Keyword : Data Security, Cryptography, Hill Cipher, RSAABSTRAKDi masa sekarang sudah menjadi hal yang biasa bahwa kerahasiaan harus benar – benar ditingkatkan dan diperketat karena menimbang kemunculan teknologi terbaru yang semakin pesat berkembang. Tentu sebuah Instansi, kelompok, ataupun individu memiliki data yang bersifat rahasia dan tidak ingin diketahui oleh pihak lain maka dari itu diperlukannya system yang mampu mengamankan data tersebut. Untuk itulah penelitian ini bertujuan membuat aplikasi Kriptografi dengan menerapkan kombinasi Algoritma Hill Cipher dan RSA, Kriptografi juga disebut bahasa persandian dan saya menerapkan Hill Cipher karena merupakan metode klasik yang menggunakan perkalian untuk tiap karakter yang disandikan sedangkan RSA adalah metode modern yang memiliki 2 kunci yaitu kunci publik dan kunci rahasia dimana kunci publik digunakan untuk penyandian dan kunci rahasia untuk menterjemahkan kembali k bentuk asli. Dengan menerapkan kombinasi metode klasik dan modern ini dapat lebih mengamankan sehingga lebih sulit untuk dapat di pecahkan oleh pihak – pihak yang tidak diinginkan.Kata Kunci : Pengamanan Data, Kriptografi, Hill Cipher, RSA.


2021 ◽  
Vol 5 (4) ◽  
pp. 768-773
Author(s):  
Aminudin ◽  
Ilyas Nuryasin

The RSA algorithm is one of the cryptographic algorithms with an asymmetric model where the algorithm has two keys, namely the public key and the private key. However, as time goes on, these algorithms are increasingly exposed to security holes and make this algorithm vulnerable to being hacked by people who do not have authority. The vulnerability stems from the algorithm's public keys (e and n). The strength of the RSA algorithm is based on the difficulty of factoring two prime numbers that are generated during the key generation process, if these values ​​can be known using certain methods, the public key and private key values ​​will be found. Therefore, there are many studies that improvise the RSA algorithm, one of which is the Dual Modulus RSA (DM-RSA) algorithm. The algorithm uses four prime numbers which produce 2 modulus and 4 keys (2 public keys and 2 private keys). From the results of the Kraitchik factorization test, it was found that the DM-RSA algorithm was proven to be more resistant up to 2 times or even more than the standard RSA algorithm. This is evidenced by the fact that the value of n is 24 bits, the RSA algorithm can last up to 63204 ms (1 minute 22 seconds) while the Dual Modulus RSA algorithm lasts up to 248494123 ms (142 minutes 47 seconds).  


2019 ◽  
Vol 8 (2) ◽  
pp. 5311-5315

RSA Algorithm is one of the widely used asymmetric cryptography. But with several conducts of the different studies, factorization attack based on the value of modulo ‘n’ and based on the public key, the value of the private key is vulnerable. With this, the study modified the RSA Algorithm based on modulo and the public key. The modulo transformed into a new value that produced a compound result in the factorization process. At the same time, the public key has been modified by choosing randomly from collected values and transformed to a different value making it a better-hidden private key. The two algorithms compared in terms of factorization, encryption and decryption, and speed. The modification of the RSA Algorithm based on modulo and public key produced a new two-tier scheme in terms of factorization, and encryption and decryption process. The new scheme in the result is resistant to factorization and has a new scheme of private key hiding.


2021 ◽  
Vol 15 (1) ◽  
pp. 74
Author(s):  
Darsanto Faiz ◽  
Rio Andriyat Krisdiawan ◽  
Dias Eka Prayuda

The investment office and one-stop integrated service (DPMPTSP) of Kuningan regency issues various kinds of permits, one of which is a building permit (IMB) issued by the investment office and one-stop integrated service on the applicant's side. Research is motivated by the vulnerability of counterfeiting permits that have been granted by the investment service and one-stop integrated services. The purpose of this research is to create a system or information technology that can help to make it easier to check building permits, one of which is by using QR-Code technology. This system can scan code that has been encrypted with the RSA algorithm so that the code created is not easily faked or read with similar applications. RSA Cryptography Algorithm, an algorithm used to encrypt and decrypt data. The RSA algorithm itself is an asymmetric algorithm, so it has a public key and a private key. RSA has a basic encryption and decryption process in the concepts of prime numbers and modulo arithmetic. The decryption and encryption keys are both integers. The encryption key is not kept secret and is known to the public so that the encryption key is also known as the public key, but the key for decryption is secret.Keywords: DPMPTSP, QR-Code, RSA Cryptrographic Algorithm


Author(s):  
P. SAVEETHA ◽  
S. ARUMUGAM

The Network Security means to protect data during their transmission over channel of networks similarly Internet Security also to protect data during their transmission over a collection of interconnected networks in all over the world. Cryptography is the way of hiding information during transmission over a cannel. There are lots of cryptographic algorithms available to protect our data from intruders.RSA also one of effective the public key cryptographic algorithm which needs time and memory. Many research papers submitted on this cryptographic algorithm. Each paper has different perspective.


2018 ◽  
Vol 4 (1) ◽  
pp. 59-67 ◽  
Author(s):  
Mihail-Iulian Plesa ◽  
Togan Mihai

The model of quantum computation has advanced very quickly in the last years. This model brings with it an efficient algorithm for factoring, namely the Shor algorithm. This means that the public key infrastructure will soon be obsolete. In this paper we propose a new quantum cryptographic scheme which aims to replace the RSA algorithm from current public key infrastructures. We analyze the security of our scheme and also, we describe the implementation of the scheme using IBM Q SDK, qiskit. We run a number of experiments in order to build a proof of concept application that uses the proposed scheme.


In cryptography Public key cryptography plays a significant job in the field of data communication. Public key uses two distinctive keys where keys are related so those, the public key can use to encode the information and private key is utilized to decode. RSA is considered as one of the effective algorithm in public key cryptography. Effectiveness of RSA Algorithm for the most part relies upon how adequately public key segments is shared i.e. common modulus n and public key exponent e. If these components compromised by the hacker using mathematical attacks, acquiring private key becomes easier task for the intruder. This paper present an upgraded RSA algorithm which is used to avoid the limitations of Integer factorization attack by improving the complexity of factorization process by utilizing fake/phony public key exponent type f rather than e and phony modulus X rather than n. Paper also gives comparative analysis of the proposed work using standard metrics.


CICES ◽  
2017 ◽  
Vol 3 (1) ◽  
pp. 35-47
Author(s):  
Faisal Rudiansyah Hamzah ◽  
Panji Wira Soma ◽  
Indri Rahmawati

With the development of information technology in particular in the field of multimedia in such rapid and the longer forms of media information more diverse so that more education institutions boast. Media information and promotion is currently used by SMK PGRI 11 Ciledug Tangerang. The purpose of this research audio visual media into the media information and proper promotion, by controlling hearing and vision in the form of audio visual in order to convey messages can be understood by the public at large. Existing problems, namely the medium used by the SMK PGRI 11 Ciledug Tangerang still use print media such as banners, posters and pamplet are considered less effective and efficient to use while simultaneously promoting the institutions with the best possible audio visual media so that it is selected into a medium of information and promotion of the right, by controlling hearing and vision in the form of audio visual. Because therein lies the message delivery process or how to visualize. At the same time listening and showing the contents of the message to the recipient with information through media menunjangnya, so the design of video media profile that displays the entire scope, advantages and facilities belonging to SMK PGRI 11 Ciledug Tangerang, can be a solution in solving problems in media promotion and information. With this study the author makes with the title "promotion and INFORMATION AUDIO VISUAL MEDIA SHAPED VIDEO PROFILE on SMK PGRI 11 APPLICATIONS TANGERANG CITY ".


Sign in / Sign up

Export Citation Format

Share Document