Implementasi Kriptografi Dengan Algoritma RSA pada Aplikasi Transfer File

Wahyu Widodo, Racmad Ardiyanto, Rinci Kembang Hapsari

Abstract


Currently, the security of information on data has become an important role in the world of technology, especially in exchanging information. One of them is file transfer. Transferring files here requires an internet connection, which will likely spread the news to irresponsible parties. Therefore, cryptography is used to secure information using the RSA algorithm. From the implementation of cryptography with the RS algorithm, there are three processes: key generation, encryption, and decryption. The results of this study from the RSA algorithm computation time for encryption for testing files with different numbers of characters have an average of 825 ms. In comparison, decryption is 781.2 ms with Throughput, which averages 221,470 Kbps.


Keywords


Cryptography, RSA, File Transfer.

Full Text:

PDF

References


J. K. Azhar and S. Yuliany, “Implementasi Algoritma RSA ( Rivest , Shamir dan Adleman) untuk Enkripsi dan Dekripsi File.pdf,” 2019.

A. Ginting, R. R. Isnanto, and I. P. Windasari, “Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email,” J. Teknol. dan Sist. Komput., vol. 3, no. 2, p. 253, 2015, doi: 10.14710/jtsiskom.3.2.2015.253-258.

S. Sutejo, “Implementasi Algoritma Kriptografi Rsa (Rivest Shamir Adleman) Untuk Keamanan Data Rekam Medis Pasien,” INTECOMS J. Inf. Technol. Comput. Sci., vol. 4, no. 1, pp. 104–114, 2021, doi: 10.31539/intecoms.v4i1.2437.

C. Himawan, T. Wibowo, B. Sulityo, R. Roestam, Y. Wahyu, and R. B. Wahyu, “Studi Perbandingan Algoritma RSA dan Algoritma El-Gamal,” Semin. Nas. APTIKOM, vol. 6, no. 1, pp. 28–29, 2016.

A. R. Taqwa and D. Haryo Sulaksono, “IMPLEMENTASI KRIPTOGRAFI DENGAN METODE ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK APLIKASI CHATTING BERBASIS ANDROID Article History ABSTRAK,” J. Ris. Inov. Bid. Inform. dan Pendidik. Inform., vol. 1, no. 1, pp. 42–48, 2020.

D. Nurnaningsih and A. A. Permana, “Rancangan Aplikasi Pengamanan Data Dengan Algoritma Advanced Encyption Standard (Aes),” J. Tek. Inform., vol. 11, no. 2, pp. 177–186, 2018, doi: 10.15408/jti.v11i2.7811.

F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Inform. Mulawarman J. Ilm. Ilmu Komput., vol. 10, no. 1, p. 20, 2016, doi: 10.30872/jim.v10i1.23.

W. R. Maya, A. Azanuddin, and E. Elfitriani, “Implementasi Kriptografi Pengamanan Data Nilai Siswa Menggunakan Algoritma DES,” J. SAINTIKOM (Jurnal Sains Manaj. Inform. dan Komputer), vol. 21, no. 1, p. 1, 2022, doi: 10.53513/jis.v21i1.4764.




DOI: https://doi.org/10.31284/p.snestik.2023.4093

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Rinci Kembang Hapsari, Wahyu Widodo, Racmad Ardiyanto

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.