DATA SECURITY SCHEME WITH A COMBINATION OF ADVANCED ENCRYPTION STANDARD (AES) AND RIVEST SHAMIR ALDEMAN (RSA) ALGORITHMS
Abstract
The rapid development of data drives the need for security in the data transmission process, with the aim of preventing access by unwanted parties to view the contents of the data sent. In order to achieve an optimal level of security, one of the strategies used is the application of cryptography. Cryptography using the Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) algorithms separately has often been used to protect the security of messages, whether in the form of text or digital images. This research will utilize a combination of the AES and RSA algorithms. This merger aims to ensure that the RSA algorithm can play a role in encrypting secret keys, while the AES algorithm is used to secure the original text (plaintext). The sender will receive the private key, encrypted secret key, and ciphertext. The recipient decrypts the secret key first using the RSA algorithm, and after obtaining the secret key, decrypts the ciphertext using the AES algorithm along with the previously decrypted secret key. It is hoped that this research will provide better security for sending information because the process of reading the contents of a secret message must go through both combination algorithms.
Downloads
References
[2] A. Prameshwari and N. P. Sastra, “Implementasi Algoritma Advanced Encryption Standard (AES) 128 Untuk Enkripsi dan Dekripsi File Dokumen,” Eksplora Inform., vol. 8, no. 1, p. 52, 2018, doi: 10.30864/eksplora.v8i1.139.
[3] D. P. Pahrizal, “Implementasi Algoritma Rsa Untuk Pengamanan Data Berbentuk Teks,” J. Pseudocode, vol. III, no. 1, p. ISSN : 2355 – 5920, 2013.
[4] M. Azhari, D. I. Mulyana, F. J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” J. Pendidik. Sains dan Komput., vol. 2, no. 01, pp. 163–171, 2022, doi: 10.47709/jpsk.v2i01.1390.
[5] A. Hanapi and W. Pramusinto, “APLIKASI KEAMANAN DATA DENGAN KRIPTOGRAFI RC4 DAN STEGANOGRAFI EOF PADA MEDIA VIDEO DI MAN 1 JAKARTA kriptografi yang digunakan adalah algoritma Rivest Code 4 (RC4) dan steganografi dengan menggunakan metode End Of File (EOF). Kata kunci : Kriptografi, Ri,” Pros. Semin. Nas. Multidisiplin Ilmu Univ. Budi Luhur, no. April, pp. 396–404, 2017.
[6] F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Inform. Mulawarman J. Ilm. Ilmu Komput., vol. 10, no. 1, p. 20, 2016, doi: 10.30872/jim.v10i1.23.
[7] A. Eka Putri, A. Kartikadewi, and L. A. Abdul Rosyid, “Implementasi Kriptografi dengan Algoritma Advanced Encryption Standard (AES) 128 Bit dan Steganografi menggunakan Metode End of File (EOF) Berbasis Java Desktop pada Dinas Pendidikan Kabupaten Tangerang,” Appl. Inf. Syst. Manag., vol. 3, no. 2, pp. 69–78, 2021, doi: 10.15408/aism.v3i2.14722.
[8] R. Toyib and A. Wijaya, “ANALISIS PERBANDINGAN ALGORITMA SIMETRIS RIVEST CODE 5 DENGAN ALGORITMA SIMETRIS RIVEST CODE 6) (Studi Kasus : SMK Negeri Seluma),” J. Inform. Upgris, vol. 4, no. 2, pp. 203–209, 2019, doi: 10.26877/jiu.v4i2.2840.
[9] D. Hulu, B. Nadeak, and S. Aripin, “Implementasi Algoritma AES (Advanced Encryption Standard) Untuk Keamanan File Hasil Radiologi di RSU Imelda Medan,” KOMIK (Konferensi …, vol. 4, pp. 78–86, 2020, doi: 10.30865/komik.v4i1.2590.
[10] D. Nurnaningsih and A. A. Permana, “Rancangan Aplikasi Pengamanan Data Dengan Algoritma Advanced Encyption Standard (Aes),” J. Tek. Inform., vol. 11, no. 2, pp. 177–186, 2018, doi: 10.15408/jti.v11i2.7811.
[11] A. R. Tulloh et al., “Kriptografi Advanced Encryption Standard (AES) Untuk Penyandian File Dokumen Cryptography Advanced Encryption Standard (AES) for File Document Encryption,” J. Mat. UNISBA, vol. Vol 2, no. 1, pp. 1–8, 2016.
[12] A. Ilmiah, “Penerapan Enkripsi AES dan Hash SHA-512 pada Sistem Jual Beli pada Toko Besi dan Bangunan,” p. 512, 2013.
[13] I. M. W. Gede Wisnu Bhaudhayana, “Implementasi Algoritma Kriptografi Aes 256 Dan Metode Steganografi Lsb Pada Gambar Bitmap,” Angew. Chemie Int. Ed. 6(11), 951–952., vol. 3, no. 1, pp. 10–27, 2018.
[14] V. Yuniati, G. Indriyanta, and A. Rachmat C., “Enkripsi Dan Dekripsi Dengan Algoritma Aes 256 Untuk Semua Jenis File,” J. Inform., vol. 5, no. 1, 2011, doi: 10.21460/inf.2009.51.69.
[15] N. Cristy and F. Riandari, “Implementasi Metode Advanced Encryption Standard ( AES 128 Bit ) Untuk Mengamankan Data Keuangan,” J. Ilmu Komput. dan Sist. Inf., vol. 4, no. 2, pp. 75–85, 2021.
[16] M. R. Rambe, E. V. Haryanto, and A. Setiawan, “Aplikasi Pengamanan Data Dan Disisipkan Pada Gambar Dengan Algoritma Rsa Dan Modified Lsb Berbasis Android,” It (Informatic Tech. J., vol. 7, no. 1, p. 51, 2019, doi: 10.22303/it.7.1.2019.51-62.
[17] T. H. Saputro, N. H. Hidayati, and E. I. H. Ujianto, “Survei Tentang Algoritma Kriptografi Asimetris,” J. Inform. Polinema, vol. 6, no. 2, pp. 67–72, 2020, doi: 10.33795/jip.v6i2.345.
Copyright (c) 2024 Antivirus : Jurnal Ilmiah Teknik Informatika
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Copyright on any article is retained by the author(s).
- Author grant the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
- The article and any associated published material is distributed under the Creative Commons Attribution-ShareAlike 4.0 International License