Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA

  • Nizirwan Anwar Universitas Esa Unggul
  • Munawwar Munawwar Universitas Esa Unggul
  • Muhammad Abduh Universitas Esa Unggul
  • Nugroho Budhi Santosa Universitas Esa Unggul
##plugins.pubIds.doi.readerDisplayName##: https://doi.org/10.29207/resti.v2i3.606

Abstract

Along with the rapid development of information technology, the ability to access and provide information to users is getting quicker and more accurate, Therefore, protecting those from any unauthorized access is very important. Cryptography can be use as theyre one of the fields of information technology development to secure data or messages that are personal and confidential. So, it takes a security to prevent things that are not desired. In this case, the message sending process will be encrypted (plaintext to ciphertext) and the recipient of the message will need to be decrypted (ciphertext to plaintext). The algorithm that we will be using are 256-bit American Encryption Standard (AES) symmetric encryption and RSA asymmetric encryption. Performance testing (size and time-process), integrity ("data integrity"), confidentiality, and "non-repudiation" of data or message security with the algorithm method above will refer to 4 (four) modern cryptographic objectives developed. Those algorithm will be used to encode data stored in document files and implementing it using Python 3.0 language and some support applications. And the results of the process of designing and testing data (text and images) obtained did not experience significant growth, but the encryption / decryption of the RSA algorithm method is much slower than the performance of the AES algorithm time-processing method

References

[1] Schneier, Bruce. 1996. Applied Cryptography. Second Edition, John Wiley & Sons.
[2] Stallings, William. 2013. Cryptography and Network Security : Principles and Practice Sixth Edition. Prentice Hall.
[3] Munir, Rinaldi. 2006. Kriptografi. Penerbit Informatika. Bandung
[4] Donny, Ariyus. 2007. Pengantar Ilmu Kriptografi : Teori, Analisis, dan Implementasi. Penerbit Andi Offset. Yogyakarta.
[5] Menezes, Oorchshot,& Vanstone. 1996. Handbook of Applied Cryptography. CRC Press. Florida
[6] Stinson, Douglas R. 2006. Cryptography: theory and Practice Third Edition. CRC Press. Florida.
[7] R. Shah Kruti ., Bhavika Gambhava. 2012. New Approach of Data Encryption Standard Algorithm. http://www.ijsce.org/wp-content/uploads/papers/v2i1/A0444022112.pdf. International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012
[8] Delfs, Hans & Knebl, Helmut. 2015. Introduction to cryptography principles and applications, Symmetric-key encryption. Penerbit Springer. ISBN 9783662479742
[9] Federal Information Processing Standards Publication 197. 2001. Advanced Encryption Standard (AES).
[10] Marwan Ali Albahar, Olayemi Olawumi, Keijo Haataja, Pekka Toivanen. 2018. Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption. Journal of Information Security, 2018, 9, 168-176 https://file.scirp.org/pdf/JIS_2018040814373482.pdf. ISSN Online: 2153-1242
[12] Prabhakar Telagarapu Birendra Biswal Vijaya Santhi Guntuk. 2011. Design and Analysis of Multimedia Communication System. IEEE- Third International Conference on Advanced Computing, ICoAC 2011 MIT, Anna University, Chennai. December 14-16, 2011
Published
2018-12-20
Section
Artikel Teknologi Informasi