Implementation of the RSA Algorithm and the One Time Pad Algorithm for Text Message Security
DOI:
https://doi.org/10.55927/fjst.v2i1.2999Keywords:
Data Security, RSA Algorithm, One Time Pad AlgorithmAbstract
Securing data is one of the things that is very important to protect the contents of the data from parties who can harm it by destroying important data from the owner. This study applies two algorithms, namely the RSA algorithm and the One Time Pad algorithm. First use the RSA algorithm first with predetermined plaintext. After finishing working on the RSA algorithm, then continue working on the same plaintext as the One Time Pad algorithm. The results of the study show that the application of the RSA and One Tome Pad algorithms, the level of security of document files and text messages can be better maintained for the authenticity of the data. So that data leakage can be minimized.
Downloads
References
Alvianto, A. R., dan Darmaji (2015): Pengaman Pengiriman Pesan Via SMS Dengan Algoritma RSA Berbasis Android, Jurnal Sains dan Seni ITS, 4(1), 1– 6.
Amarudin. (2018). Desain Keamanan Jaringan Pada Mikrotik Router OS Menggunakan Metode Port Knocking. Jurnal Teknoinfo, 12(2), 72. https://doi.org/10.33365/jti.v12i2.121
Apdilah, D., dan Swanda, H., (2018): Penerapan Kriptografi RSA Dalam Menga- mankan File Teks Berbasis PHP, Jurnal Teknologi Informasi, 2(1), 45–52.
Arief, A., & Saputra, R. (2016). Implementasi Kriptografi Kunci Publik dengan Algoritma RSA-CRT pada Aplikasi Instant Messaging. Scientific Journal of Informatics, 3(1), 46–54. https://doi.org/10.15294/sji.v3i1.6115
Azis, N. (2018). Perancangan Aplikasi Enkripsi Dekripsi Menggunakan Metode Caesar Chiper dan Operasi XOR. Ikraith-Informatika, 2(1), 72–80.
Ginting, A., Isnanto, R. R., & Windasari, I. P. (2015). 144706-ID-implementasi-algoritma-kriptografi-rsa-u. Jurnal Teknologi Dan Sistem Komputer, 3(2), 253–258. https://media.neliti.com/media/publications/144706-ID-implementasi-algoritma-kriptografi-rsa-u.pdf
Gunawan, I. (2018). Kombinasi Algoritma Caesar Cipher dan Algoritma RSA untuk pengamanan File Dokumen dan Pesan Teks. InfoTekJar (Jurnal Nasional Informatika Dan Teknologi Jaringan), 2(2), 124–129. https://doi.org/10.30743/infotekjar.v2i2.266
Hidayat, A., dan Faizin, A., (2019): Perbandingan Kriptografi Menggunakan Algoritma Data Encryption Standart(DES)dan Algoritma Rivest Shamir Adleman(RSA)Untuk Keamanan Data, JASIEK, 1(2), 143 – 148.
Hidayatullah, A., dan Insannudin, E., (2016): Pengenalan Kriptografi dan Pemaka- iannya Sehari-hari, JurnalPengenalan Kriptografi dan Pemakaiannya Sehari- hari, 1–6.
Jafarudin Firdaus, R. M., dan Gozali, S. M., (2018): Penyandian Pesan Menggu- nakan Kombinasi Algoritma RSA Yang Ditingkatkan dan Algoritma Elgamal, Jurnal EurekaMatika, 6(1), 23–32.
Munir, R. (2006). Pengantar Kriptografi. Bahan Kuliah IF4020.
Nagar, S. A., & Alshamma, S. (2012). High Speed Implementation of RSA Algorithm with Modified Keys Exchange. 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 639-642
Pabokory, F. N., Astuti, I. F., & Kridalaksana, A. H. (2016). Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard. Informatika Mulawarman : Jurnal Ilmiah Ilmu Komputer, 10(1), 20. https://doi.org/10.30872/jim.v10i1.23
Sutoyo, M. N., & Murhaban. (2016). Kombinasi Algoritma Kriptografi Caesar Chiper dan Vigenere Chiper Untuk Keamanan Data. Jurnal Mekanova, 2(2), 58–66.
Zainal Arifin. 2009. Studi Kasus : Penggunaan Algoritma RSA sebagai algoritma kriptografi yang aman. Samarinda.
Zhao, G., Yang, X., Zhou, B., & Wei, W. (2010). RSABased Digital Image Encryption Algorithm In Wireless Sensor Networks. 2nd International Conference on Signal Processing Systems ICSPS), 640-643.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Zulfahmi Indra, Rinjani Cyra Nabila

This work is licensed under a Creative Commons Attribution 4.0 International License.





























