Implementation of Cryptography Using the RSA (Rivest-Shamir-Adleman) Algorithm in Encoding Text Messages and Documents

Septi Rahmita Sari, Resmawan Resmawan, Nisky Imansyah Yahya, Lailany Yahya

Abstract


Cryptography can be used in prevent data, one of the preventive measures is by encoding messages. Cryptography is the study of encoding messages or ways of data protection. In encoding the content of messages, there is an algorithm conventionally used nowadays, the RSA (Rivest-Shamir-Adleman) algorithm. The RSA algorithm is a method that has two different keys for each encryption and decryption process but is still interrelated to maintain security in processing the data. In finding the key, the RSA algorithm utilizes the rule of prime number. The larger the prime number used as a key, the harder it is to find a large number as a factor. This research describes the process of encrypting text messages, the content of documents using the RSA algorithm, and the key generation process. Those processes are done by converting plaintext into ciphertext using ASCII code, which is 256 long, and using PKCS (Public Key Cryptography Standards) is the encryption process on the RSA algorithm. This study uses Pyhton programming language to implement the RSA algorithm on text messages and documents. As a recommendation to the subsequent studies, it is proper to use algorithms or other programming languages to secure messages.

Keywords


RSA algorithm; text message; encryption; decryption

Full Text:

PDF


DOI: https://doi.org/10.15548/jostech.v4i1.8280
Abstract views : 31 times
PDF : 16 times

References


A. Ginting, R. R. Isnanto, dan I. P. Windasari, “Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email,” J. Teknol. dan Sist. Komput., vol. 3, no. 2, hal. 253, 2015, doi: 10.14710/jtsiskom.3.2.2015.253-258.

M. W. Indriyanto, D. Hariyadi, dan M. Habibi, “Investigasi Dan Analisis Forensik Digital Pada Percakapan Grup Whatsapp Menggunakan Nist Sp 800-86 Dan Support Vector Machine Digital Forensics Investigation and Analysis on Whatsapp Group Chats Using Nist Sp 800-86 and Support Vector Machine,” Cyber Secur. dan Forensik Digit., vol. 3, no. 2, hal. 34–38, 2020.

A. A. Rakhman dan A. W. Kurniawan, “Implementasi Algoritma Kriptografi Rivest Shamir Adleman ( Rsa ) Dan Vigenere Cipher Pada Gambar Bitmap 8 Bit,” Techno.COM, vol. 14, no. 2, hal. 122–134, ISSN:2356-2579, 2015.

Y. Reswan dan D. A. Prabowo, “Perancangan Aplikasi Pengamanan Data Text Menggunakan Kombinasi Algoritma Hill Cipher Dan Algoritma RSA,” JSI J. Sist. Inf., vol. 10, no. 2, hal. 1535–1545, 2018, doi: 10.36706/jsi.v10i2.8057.

R. Sahara, H. Prastiawan, dan A. Rohman, “Barat 11650 3 Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika 3 Jl,” Univ. Mercu Buana 12 Jl. Raya Meruya Selatan, vol. 5, no. 9, hal. 118–122, 2017.

D. Wulansari, Alamsyah, F. A. Setyawan, dan H. Susanto, “Mengukur Kecepatan Enkripsi dan Dekripsi Algoritma RSA pada Pengembangan Sistem Informasi Text Security,” Semin. Nas. Ilmu Komput. (SNIK 2016), no. Snik, hal. 85–91, 2016.

T. Rahajoeningroem dan M. Aria, “Studi dan Implementasi Algoritma RSA untuk pengamanan Data transkip Mahasiswa,” Maj. Ilm. Unikom, vol. 8, no. 1, hal. 77–90, 2011, [Daring]. Tersedia pada: http://jurnal.unikom.ac.id/_s/data/jurnal/v08-n01/volume-81-artikel-9.pdf/pdf/volume-81-artikel-9.pdf.

A. N. Agustina, Aryanti, dan Nasron, “Pengamanan Dokumen Menggunakan Kombinasi Metode Rsa (Rivest Shamir Adleman) Berbasis Web,” Pros. Semin. Nas. Multi Disiplin Ilmu Call Pap. UNISBANK, hal. 14–19, 2017, [Daring]. Tersedia pada: https://www.neliti.com/id/publications/174360/pengamanan-dokumen-menggunakan-metode-rsa-rivest-shamir-adlemanberbasis-web.

N. T. E. Hermawan, E. Winarko, dan A. Ashari, “Multi prime numbers principle to expand implementation of CRT method on RSA algorithm,” AIP Conf. Proc., vol. 2331, no. April, 2021, doi: 10.1063/5.0041856.

S. Suhandinata, R. A. Rizal, D. O. Wijaya, P. Warren, dan Srinjiwi, “Analisis Performa Kriptografi Hybrid Algoritma RSA,” Jurteksi, vol. VI, no. 1, hal. 1–10, 2019.

I. Halik dan Y. Prayudi, “Studi dan Analisis Algoritma Rivest Code 6 (RC6) dalam Enkripsi/Dekripsi Data,” Snati, vol. 6, no. D, 2005, [Daring]. Tersedia pada: http://journal.uii.ac.id/index.php/Snati/article/view/1402.

A. A. Wahid, “Analisis Metode Waterfall Untuk Pengembangan Sistem Informasi,” J. Ilmu-ilmu Inform. dan Manaj. STMIK, no. November, hal. 1–5, 2020, [Daring]. Tersedia pada: https://www.researchgate.net/profile/Aceng_Wahid/publication/346397070_Analisis_Metode_Waterfall_Untuk_Pengembangan_Sistem_Informasi/links/5fbfa91092851c933f5d76b6/Analisis-Metode-Waterfall-Untuk-Pengembangan-Sistem-Informasi.pdf.

M. Natsir, “Pengembangan Prototype Sistem Kriptografi Untuk Enkripsi Dan Dekripsi Data Office Menggunakan Metode Blowfish Dengan Bahasa Pemrograman Java,” Jurnal, vol. 6, no. 2, hal. 2089–5615, 2016.

R. Munir, Kriptografi, Edisi Kedu. Bandung: Informatika, 2019.

D. B. Ginting, “Peranan Aritmetika Modulo dan Bilangan Prima pada Algoritma Kriptografi RSA (Rivest-Shamir-Adleman),” Media Inform., vol. 9, no. 2, 2010.

A. M. S. Pangan, I. L. Lacuesta, R. C. Mabborang, dan F. P. Ferrer, “Authenticating Data Transfer Using RSA-Generated QR Codes,” Eur. J. Inf. Technol. Comput. Sci., vol. 2, no. 4, hal. 18–30, 2022, doi: 10.24018/compute.2022.2.4.73.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 JOSTECH Journal of Science and Technology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.