Komparasi Waktu Algoritma RSA dengan RSA-CRT Base On Computer
DOI:
https://doi.org/10.21580/wjit.2020.2.1.5402Keywords:
Encryption, Decryption, RSA-CRTAbstract
Cryptography is a branch of mathematics. Asymmetric algorithms such as RSA, including the type of cryptography that is more widely used to be implemented in everyday life because it has an algorithm that is not easy to be misused by others. However, the encryption and decryption process of RSA requires quite a long time. For this reason, RSA - CRT emerged. In this study a time comparison between the RSA algorithm and the RSA-CRT Base On Computer is done. The purpose of this study was to determine the execution time of the RSA-CRT algorithm using PHP.
This research uses the Research and Development or R&D method, with the R&D method created by the product development RSA-CRT algorithm application from UIN Walisongo Semarang based on computer. Based on the data analysis, the conclusion is that although the manual calculation of the RSA-CRT algorithm takes longer than the others in this case RSA. But have a faster time when using PHP.
Downloads
References
Affandi, M. (2017). Teknologi Informasi & Komunikasi dalam Pendidikan. Kuningan: YNHW(Yayasan Nurul Huda Windusengkahan).
Alba, S. C., Supriana, I. I., & Mahzar, A. (2004). Islam untuk Disiplin Ilmu MANAJEMEN INFORMATIKA. (muharrom dan zulmaizarna Marzuki, Ed.). Departemen Agama RI Direktorat Jenderal Kelembagaan Agama Islam.
Alul, N. M. M. (2014). PENTINGNYA STABILITAS KEAMANAN DALAM ISLAM. Retrieved December 17, 2019, from https://almanhaj.or.id/3933-pentingnya-stabilitas-keamanan-dalam-islam.html%0D
Andika, D. (2018). Pengertian dan Sejarah Kriptografi. Retrieved May 1, 2019, from https://www.it-jurnal.com/pengertian-dan-sejarah-kriptografi/
Buana, T. D. U. M. (2010). Kripto grafi. Universitas Mercu Buana.
Erawan, L. (2014). Dasar - dasar PHP (pp. 1–47). semarang: Universitas Dian Nuswantoro.
Irawan, I. (2006). PHP? Siapa Takut! (pp. 1–108). ilmu komputer.com. Retrieved from IlmuKomputer.com
Kadir, A. (2009). MEMBUAT APLIKASI LAPORAN MENGGUNAKAN PHP. (H. P, Ed.) (I). Yogyakarta: C.V ANDI OFFSET(Penerbit ANDI).
Kromodimoeljo, S. (2009). TEORI &APLIKASI KRIPTOGRAFI. SPK IT Consulting.
Mahali, M. I. (2015). Dasar-Dasar Keamanan (Steganografi dan Kriptografi). Yogyakarta.
Mawardina, M., & Insanudin, E. (2016). Aplikasi Kriptografi dengan Metode Vigenere Chiper Berbasis Web. Bandung.
Mono, H. (2010). Cybercrime, Bobol Rp 0,5 trilyun #1. Retrieved October 20, 2019, from https://www.kompasiana.com/mono.kompasiana.com/54ff6062a33311c34f50fb02/cybercrime-bobol-rp-05-trilyun-1%0D
Munir, R. (2004a). Algoritma RSA dan ElGamal (pp. 1–13). Bandung: Departemen Teknik Informatika Institu Teknologi Bandung.
Munir, R. (2004b). Sistem Kriptografi Kunci-Publik. Bandung: Departemen Teknik Informatika Institut Teknologi Bandung.
Munir, R. (2004c). Teori Bilangan ( Number Theory ). In Kriptografi. Bandung: Departemen Teknik Informatika Institut Teknologi Bandung.
Nasution, N. R. (2017). Kombinasi RSA-CRT dengan Random LSB untuk Keamanan Data di Kanwil Kementerian Agama Prov. Sumatera Utara. QUERY :Jurnal Sistem Informasi, 01(01).
PAS(Panduan Aplikatif dan Solusi): MUDAH MEMBUAT PORTAL BERITA ONLINE DENGAN PHP DAN MYSQL. (2012) (I). Yogyakarta;Semarang: Penerbit ANDI; Wahana Komputer.
Pertemuan1. Algoritma dan PHP. (n.d.).
Q-Success. (2019). Usage of server-side programming languages for websites. Retrieved July 9, 2019, from https://w3techs.com/technologies/overview/programming_language/all
Qasim, A. M. Al. (2014). Al-Qur’an Terjemah & Tajwid. (T. S. M. Inovasi, Ed.) (I). Bandung: sygma creative media corp.
Raco, R. (2010). Metode Penelitian Kualitatif. (Arita L, Ed.). Jakarta: PT Grasindo.
Rosnawan, D. (2011). Aplikasi Algoritma RSA Untuk Keamanan Data pada Sistem Informasi Berbasis Web. Universitas Negeri Semarang.
Sadikin, R. (2012). Kriptografi Untuk Keamanan Jaringan. Yogyakarta: Penerbit ANDI.
SCHNEIER, B. (n.d.). APPLIED CRYPTOGRAPHY : Protocol, Algoritmhms, and Source Code in C (kedua).
Stallings, W. (2005). Cryptography and Network Security (4th Edition) (4th ed.). Prentice Hall.
Sufyani, P. (n.d.). Aritmatika Modular. Retrieved July 15, 2019, from related:file.upi.edu/Direktori/FPMIPA/JUR._PEND._MATEMATIKA/196008301986031-SUFYANI_PRABAWANTO/Aritmatika_Modular.pdf aritmatika modulo.pdf
Suprapto. (2008). BAHASA PEMROGRAMAN. Direktorat Pembinaan SMK.
Suryana, T., & Koesheryatin. (2014). Aplikasi Internet Menggunakan HTML, CSS & JavaScript. Jakarta: PT Elex Media Komputindo.
Downloads
Published
Issue
Section
License
The copyright of the received article shall be assigned to the journal as the publisher of the journal. The intended copyright includes the right to publish the article in various forms (including reprints). The journal maintains the publishing rights to the published articles. Authors are allowed to use their articles for any legal purposes deemed necessary without written permission from the journal with an acknowledgment of initial publication to this journal.
Licensing
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.