scholarly journals IMPLEMENTASI KRIPTOGRAFI RSA DENGAN PHP

2017 ◽  
Vol 1 (1) ◽  
pp. 1
Author(s):  
Muhammad Yasin Simargolang

Abstract - Cryptography is an art and science to maintain data security. In maintaining the security of cryptographic data transforming clear data (plaintext) into a password (ciphertext) that cannot be recognized. This ciphertext is then sent by the sender to the recipient. After arriving at the recipient, the ciphertext is transformed back into a plaintext form so that it can be recognized. The method used is the encryption method asymmetrical Rivest Shamir Adleman (RSA). The security of the RSA algorithm lies in the difficulty of factoring large numbers into prime factors. Factoring is done to obtain a private key. Making this application using the PHP programming language. The final result is a desktop-based application that can be used to encrypt text files. This application can be used as a way to secure data, because only authorized people can view encrypted data. Keywords - Cryptography, RSA, Encryption - Decryption, Text, PHP

Author(s):  
Shoulin Yin ◽  
Lin Teng ◽  
Jie Liu

<p><em>Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, the other party with another key receives the ciphertext. Encryption key is not the same as the decryption key, and cannot deduce another key from any one of the key, thus it greatly enhances the information protection, and can prevent leakage the user's search criteria<span style="font-family: 宋体;">—</span><span style="font-family: 'Times New Roman';">Search Pattern. Secure schemes of SAE are practical, sometimes, however the speed of encryption/decryption in Public-key encryption is slower than private key. In order to get higher efficiency and security in information retrieval, in this paper we introduce the concept of distributed SAE, which is useful for security and can enable search operations on encrypted data. Moreover, we give the proof of security.</span></em><em></em></p>


2019 ◽  
Author(s):  
Ronal Watrianthos

Security is very important in all aspects to protect data. Text messages on mobile phones, which is sms (short messages service) is one of theimportant data that needs a data security system. Data security is used to maintain the confidentiality of important data that we have on mobile devices.The encryption process is used so that messages cannot be read by other unwanted parties. While the decryption process is used so that the messagecan be read back by the intended party. Rivest Cryptography, Shamir, Adleman (RSA) is one of the asymmetric cryptographic algorithms that use a keypair, that is the public key and private key. The key length can be set, where the longer the key formation bit, the harder it is to solve because it is difficultto factor two very large numbers. This study applies the Rivest, Shamir, Adleman (RSA) algorithm for text message security applications based onAndroid. Based on the research that has been done, the author can draw conclusions, namely: Rivest, Shamir, Adleman (RSA) cryptographic algorithmcan be implemented for text message security Android based. So it is safer to exchange text messages (SMS) so that user privacy is guaranteed


Author(s):  
R. Felista Sugirtha Lizy Et.al

Information Security has become an essential concern in the modern world. Encryption is an effective way to prevent an unofficial person from viewing the digital information with the secret key. RSA encryption is often used for digital signatures which can prove the authenticity and reliability of a message. As RSA encryption is less competent and resource-heavy, it is not used to encrypt the entire message. If a message is encrypted with a symmetric-key RSA encryption it will be more efficient. Under this process, only the RSA private key will be able to decrypt the symmetric key. The Euclidean algorithm is attainably one of the most extensively known algorithms.  The Euclidean algorithm is used for finding the greatest common divisor of two numbers. The algorithm can also be defined for more general rings than just the integers. This work is very useful to improve the data security in Smart card and Aadhaar card. In this paper, the RSA algorithm is modified using the Euclidean technique to improve its performance. The proposed algorithm shows its better performance in terms of speed, throughput, power consumption, and the avalanche effect. Experimental results and mathematical justification supporting the proposed method are reported.


2021 ◽  
Vol 1 (1) ◽  
pp. 1-6
Author(s):  
Togar Timoteus Gultom

The higher the value of a data, the higher the risk of damage or loss of the data. This is understandable, because high-value data is like "life" for humans, so if a data has been damaged or even lost, then the data has no meaning anymore. There are many ways to protect data. Data protection uses a method called encryption process which encodes the code in the original text into arbitrary characters. So that the contents of the encrypted data can be read again, it is necessary to change the contents of the data to its original form, this process is called decryption. In this study, a File Security System Protection Application Design was made using a hybrid affine cipher and the RSA algorithm. This application is made using the Delphi 7.0 Programming Language.


Author(s):  
Raja Nasrul Fuad ◽  
Haikal Nando Winata

The WAV file format that is widely used rough on various kinds of multimedia and gaming platforms. Ease of access and technological development with a variety of media to facilitate the exchange of information to various places. The data are important and need to be kept confidential secret for a wide range of security threats so that data can be intercepted and acknowledged by third parties during the shipping process. Of these problems led to the idea to create an application data security functions can secure the data using the RSA algorithm. The programming language is C # with Visual Studio software, the processed data is a sample each byte in WAV file, the header will be the same as that originally WAV files can be played even if the information has been withheld. RSA algorithm can be implemented into a programming language that WAV files can be processed and secured the data.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1389
Author(s):  
Jiwon Lee ◽  
Jihye Kim ◽  
Hyunok Oh

In public key broadcast encryption, anyone can securely transmit a message to a group of receivers such that privileged users can decrypt it. The three important parameters of the broadcast encryption scheme are the length of the ciphertext, the size of private/public key, and the performance of encryption/decryption. It is suggested to decrease them as much as possible; however, it turns out that decreasing one increases the other in most schemes. This paper proposes a new broadcast encryption scheme for tiny Internet of Things (IoT) equipment (BESTIE), minimizing the private key size in each user. In the proposed scheme, the private key size is O(logn), the public key size is O(logn), the encryption time per subset is O(logn), the decryption time is O(logn), and the ciphertext text size is O(r), where n denotes the maximum number of users, and r indicates the number of revoked users. The proposed scheme is the first subset difference-based broadcast encryption scheme to reduce the private key size O(logn) without sacrificing the other parameters. We prove that our proposed scheme is secure under q-Simplified Multi-Exponent Bilinear Diffie-Hellman (q-SMEBDH) in the standard model.


Sign in / Sign up

Export Citation Format

Share Document