Komparasi Waktu Algoritma RSA dengan RSA-CRT Base On Computer

Nur Cayo Hendro Wibowo, Khotibul Umam, Albadru Muh Izul Khaq, Favian Agung Rizki

Abstract


Cryptography is a branch of mathematics. Asymmetric algorithms such as RSA, including the type of cryptography that is more widely used to be implemented in everyday life because it has an algorithm that is not easy to be misused by others. However, the encryption and decryption process of RSA requires quite a long time. For this reason, RSA - CRT emerged. In this study a time comparison between the RSA algorithm and the RSA-CRT Base On Computer is done. The purpose of this study was to determine the execution time of the RSA-CRT algorithm using PHP.

This research uses the Research and Development or R&D method, with the R&D method created by the product development RSA-CRT algorithm application from UIN Walisongo Semarang based on computer. Based on the data analysis, the conclusion is that although the manual calculation of the RSA-CRT algorithm takes longer than the others in this case RSA. But have a faster time when using PHP.

 


Keywords


Encryption; Decryption; RSA-CRT

Full Text:

PDF

References


Affandi, M. (2017). Teknologi Informasi & Komunikasi dalam Pendidikan. Kuningan: YNHW(Yayasan Nurul Huda Windusengkahan).

Alba, S. C., Supriana, I. I., & Mahzar, A. (2004). Islam untuk Disiplin Ilmu MANAJEMEN INFORMATIKA. (muharrom dan zulmaizarna Marzuki, Ed.). Departemen Agama RI Direktorat Jenderal Kelembagaan Agama Islam.

Alul, N. M. M. (2014). PENTINGNYA STABILITAS KEAMANAN DALAM ISLAM. Retrieved December 17, 2019, from https://almanhaj.or.id/3933-pentingnya-stabilitas-keamanan-dalam-islam.html%0D

Andika, D. (2018). Pengertian dan Sejarah Kriptografi. Retrieved May 1, 2019, from https://www.it-jurnal.com/pengertian-dan-sejarah-kriptografi/

Buana, T. D. U. M. (2010). Kripto grafi. Universitas Mercu Buana.

Erawan, L. (2014). Dasar - dasar PHP (pp. 1–47). semarang: Universitas Dian Nuswantoro.

Irawan, I. (2006). PHP? Siapa Takut! (pp. 1–108). ilmu komputer.com. Retrieved from IlmuKomputer.com

Kadir, A. (2009). MEMBUAT APLIKASI LAPORAN MENGGUNAKAN PHP. (H. P, Ed.) (I). Yogyakarta: C.V ANDI OFFSET(Penerbit ANDI).

Kromodimoeljo, S. (2009). TEORI &APLIKASI KRIPTOGRAFI. SPK IT Consulting.

Mahali, M. I. (2015). Dasar-Dasar Keamanan (Steganografi dan Kriptografi). Yogyakarta.

Mawardina, M., & Insanudin, E. (2016). Aplikasi Kriptografi dengan Metode Vigenere Chiper Berbasis Web. Bandung.

Mono, H. (2010). Cybercrime, Bobol Rp 0,5 trilyun #1. Retrieved October 20, 2019, from https://www.kompasiana.com/mono.kompasiana.com/54ff6062a33311c34f50fb02/cybercrime-bobol-rp-05-trilyun-1%0D

Munir, R. (2004a). Algoritma RSA dan ElGamal (pp. 1–13). Bandung: Departemen Teknik Informatika Institu Teknologi Bandung.

Munir, R. (2004b). Sistem Kriptografi Kunci-Publik. Bandung: Departemen Teknik Informatika Institut Teknologi Bandung.

Munir, R. (2004c). Teori Bilangan ( Number Theory ). In Kriptografi. Bandung: Departemen Teknik Informatika Institut Teknologi Bandung.

Nasution, N. R. (2017). Kombinasi RSA-CRT dengan Random LSB untuk Keamanan Data di Kanwil Kementerian Agama Prov. Sumatera Utara. QUERY :Jurnal Sistem Informasi, 01(01).

PAS(Panduan Aplikatif dan Solusi): MUDAH MEMBUAT PORTAL BERITA ONLINE DENGAN PHP DAN MYSQL. (2012) (I). Yogyakarta;Semarang: Penerbit ANDI; Wahana Komputer.

Pertemuan1. Algoritma dan PHP. (n.d.).

Q-Success. (2019). Usage of server-side programming languages for websites. Retrieved July 9, 2019, from https://w3techs.com/technologies/overview/programming_language/all

Qasim, A. M. Al. (2014). Al-Qur’an Terjemah & Tajwid. (T. S. M. Inovasi, Ed.) (I). Bandung: sygma creative media corp.

Raco, R. (2010). Metode Penelitian Kualitatif. (Arita L, Ed.). Jakarta: PT Grasindo.

Rosnawan, D. (2011). Aplikasi Algoritma RSA Untuk Keamanan Data pada Sistem Informasi Berbasis Web. Universitas Negeri Semarang.

Sadikin, R. (2012). Kriptografi Untuk Keamanan Jaringan. Yogyakarta: Penerbit ANDI.

SCHNEIER, B. (n.d.). APPLIED CRYPTOGRAPHY : Protocol, Algoritmhms, and Source Code in C (kedua).

Stallings, W. (2005). Cryptography and Network Security (4th Edition) (4th ed.). Prentice Hall.

Sufyani, P. (n.d.). Aritmatika Modular. Retrieved July 15, 2019, from related:file.upi.edu/Direktori/FPMIPA/JUR._PEND._MATEMATIKA/196008301986031-SUFYANI_PRABAWANTO/Aritmatika_Modular.pdf aritmatika modulo.pdf

Suprapto. (2008). BAHASA PEMROGRAMAN. Direktorat Pembinaan SMK.

Suryana, T., & Koesheryatin. (2014). Aplikasi Internet Menggunakan HTML, CSS & JavaScript. Jakarta: PT Elex Media Komputindo.




DOI: http://dx.doi.org/10.21580/wjit.2020.2.1.5402

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Walisongo Journal of Information Technology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Citation Statistics


WJIT : Walisongo Journal of Information Technology 
Program Studi Teknologi Informasi, Fakultas Sains dan Technologi
Universitas Islam Negeri Walisongo Semarang 
Prof. Dr. HAMKA St., KM 2nd. Semarang, Central Java, Indonesia
View My Stats