Komparasi Waktu Algoritma RSA dengan RSA-CRT Base On Computer

Nur Cayo Hendro Wibowo  -  Universitas Islam Negeri Walisongo, Indonesia
Khotibul Umam  -  Universitas Islam Negeri Walisongo, Indonesia
Albadru Muh Izul Khaq*  -  Universitas Islam Negeri Walisongo, Indonesia
Favian Agung Rizki  -  Universitas Islam Negeri Walisongo, Indonesia

(*) Corresponding Author

Cryptography is a branch of mathematics. Asymmetric algorithms such as RSA, including the type of cryptography that is more widely used to be implemented in everyday life because it has an algorithm that is not easy to be misused by others. However, the encryption and decryption process of RSA requires quite a long time. For this reason, RSA - CRT emerged. In this study a time comparison between the RSA algorithm and the RSA-CRT Base On Computer is done. The purpose of this study was to determine the execution time of the RSA-CRT algorithm using PHP.

This research uses the Research and Development or R&D method, with the R&D method created by the product development RSA-CRT algorithm application from UIN Walisongo Semarang based on computer. Based on the data analysis, the conclusion is that although the manual calculation of the RSA-CRT algorithm takes longer than the others in this case RSA. But have a faster time when using PHP.

 

Keywords: Encryption; Decryption; RSA-CRT

  1. Affandi, M. (2017). Teknologi Informasi & Komunikasi dalam Pendidikan. Kuningan: YNHW(Yayasan Nurul Huda Windusengkahan).
  2. Alba, S. C., Supriana, I. I., & Mahzar, A. (2004). Islam untuk Disiplin Ilmu MANAJEMEN INFORMATIKA. (muharrom dan zulmaizarna Marzuki, Ed.). Departemen Agama RI Direktorat Jenderal Kelembagaan Agama Islam.
  3. Alul, N. M. M. (2014). PENTINGNYA STABILITAS KEAMANAN DALAM ISLAM. Retrieved December 17, 2019, from https://almanhaj.or.id/3933-pentingnya-stabilitas-keamanan-dalam-islam.html%0D
  4. Andika, D. (2018). Pengertian dan Sejarah Kriptografi. Retrieved May 1, 2019, from https://www.it-jurnal.com/pengertian-dan-sejarah-kriptografi/
  5. Buana, T. D. U. M. (2010). Kripto grafi. Universitas Mercu Buana.
  6. Erawan, L. (2014). Dasar - dasar PHP (pp. 1–47). semarang: Universitas Dian Nuswantoro.
  7. Irawan, I. (2006). PHP? Siapa Takut! (pp. 1–108). ilmu komputer.com. Retrieved from IlmuKomputer.com
  8. Kadir, A. (2009). MEMBUAT APLIKASI LAPORAN MENGGUNAKAN PHP. (H. P, Ed.) (I). Yogyakarta: C.V ANDI OFFSET(Penerbit ANDI).
  9. Kromodimoeljo, S. (2009). TEORI &APLIKASI KRIPTOGRAFI. SPK IT Consulting.
  10. Mahali, M. I. (2015). Dasar-Dasar Keamanan (Steganografi dan Kriptografi). Yogyakarta.
  11. Mawardina, M., & Insanudin, E. (2016). Aplikasi Kriptografi dengan Metode Vigenere Chiper Berbasis Web. Bandung.
  12. Mono, H. (2010). Cybercrime, Bobol Rp 0,5 trilyun #1. Retrieved October 20, 2019, from https://www.kompasiana.com/mono.kompasiana.com/54ff6062a33311c34f50fb02/cybercrime-bobol-rp-05-trilyun-1%0D
  13. Munir, R. (2004a). Algoritma RSA dan ElGamal (pp. 1–13). Bandung: Departemen Teknik Informatika Institu Teknologi Bandung.
  14. Munir, R. (2004b). Sistem Kriptografi Kunci-Publik. Bandung: Departemen Teknik Informatika Institut Teknologi Bandung.
  15. Munir, R. (2004c). Teori Bilangan ( Number Theory ). In Kriptografi. Bandung: Departemen Teknik Informatika Institut Teknologi Bandung.
  16. Nasution, N. R. (2017). Kombinasi RSA-CRT dengan Random LSB untuk Keamanan Data di Kanwil Kementerian Agama Prov. Sumatera Utara. QUERY :Jurnal Sistem Informasi, 01(01).
  17. PAS(Panduan Aplikatif dan Solusi): MUDAH MEMBUAT PORTAL BERITA ONLINE DENGAN PHP DAN MYSQL. (2012) (I). Yogyakarta;Semarang: Penerbit ANDI; Wahana Komputer.
  18. Pertemuan1. Algoritma dan PHP. (n.d.).
  19. Q-Success. (2019). Usage of server-side programming languages for websites. Retrieved July 9, 2019, from https://w3techs.com/technologies/overview/programming_language/all
  20. Qasim, A. M. Al. (2014). Al-Qur’an Terjemah & Tajwid. (T. S. M. Inovasi, Ed.) (I). Bandung: sygma creative media corp.
  21. Raco, R. (2010). Metode Penelitian Kualitatif. (Arita L, Ed.). Jakarta: PT Grasindo.
  22. Rosnawan, D. (2011). Aplikasi Algoritma RSA Untuk Keamanan Data pada Sistem Informasi Berbasis Web. Universitas Negeri Semarang.
  23. Sadikin, R. (2012). Kriptografi Untuk Keamanan Jaringan. Yogyakarta: Penerbit ANDI.
  24. SCHNEIER, B. (n.d.). APPLIED CRYPTOGRAPHY : Protocol, Algoritmhms, and Source Code in C (kedua).
  25. Stallings, W. (2005). Cryptography and Network Security (4th Edition) (4th ed.). Prentice Hall.
  26. Sufyani, P. (n.d.). Aritmatika Modular. Retrieved July 15, 2019, from related:file.upi.edu/Direktori/FPMIPA/JUR._PEND._MATEMATIKA/196008301986031-SUFYANI_PRABAWANTO/Aritmatika_Modular.pdf aritmatika modulo.pdf
  27. Suprapto. (2008). BAHASA PEMROGRAMAN. Direktorat Pembinaan SMK.
  28. Suryana, T., & Koesheryatin. (2014). Aplikasi Internet Menggunakan HTML, CSS & JavaScript. Jakarta: PT Elex Media Komputindo.

Open Access Copyright (c) 2020 Walisongo Journal of Information Technology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Walisongo Journal of Information Technology
Published by Department Information Technology
Faculty of Science and Technology UIN Walisongo Semarang

Jl Prof. Dr. Hamka Kampus III Ngaliyan Semarang 50185
Phone: 024-76433366
Website: https://fst.walisongo.ac.id/
Email: ti@walisongo.ac.id

ISSN 2715-0143 (media online)
ISSN 2714-9048 (media cetak)

 

ISSN: 2714-9048 (Print)
ISSN: 2715-0143 (Online)
DOI : 10.21580/wjit

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Get a feed by atom here, RRS2 here and OAI Links here

View My Stats
apps