DATA SECURITY SCHEME WITH A COMBINATION OF ADVANCED ENCRYPTION STANDARD (AES) AND RIVEST SHAMIR ALDEMAN (RSA) ALGORITHMS

  • Hedy Sholihat Ruhaedi Siliwangi University
  • Alam Rahmatulloh Siliwangi University
Abstract views: 13 , PDF downloads: 20
Keywords: Ciphertext, Description, Encryption, Message Security, Plaintext

Abstract

The rapid development of data drives the need for security in the data transmission process, with the aim of preventing access by unwanted parties to view the contents of the data sent. In order to achieve an optimal level of security, one of the strategies used is the application of cryptography. Cryptography using the Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) algorithms separately has often been used to protect the security of messages, whether in the form of text or digital images. This research will utilize a combination of the AES and RSA algorithms. This merger aims to ensure that the RSA algorithm can play a role in encrypting secret keys, while the AES algorithm is used to secure the original text (plaintext). The sender will receive the private key, encrypted secret key, and ciphertext. The recipient decrypts the secret key first using the RSA algorithm, and after obtaining the secret key, decrypts the ciphertext using the AES algorithm along with the previously decrypted secret key. It is hoped that this research will provide better security for sending information because the process of reading the contents of a secret message must go through both combination algorithms.

Downloads

Download data is not yet available.

References

[1] S. R. Siburian, R. Alek, S. Sinaga, and F. Yudistira, “Kriptosistem Hybrid Menggunakan Kombinasi Aes Dan Rsa Untuk Enkripsi Teks Pesan,” J. JOCOTIS - J. Sci. Inform. Robot., vol. 1, no. 1, pp. 22–31, 2023, [Online]. Available: https://jurnal.ittc.web.id/index.php/jct/
[2] A. Prameshwari and N. P. Sastra, “Implementasi Algoritma Advanced Encryption Standard (AES) 128 Untuk Enkripsi dan Dekripsi File Dokumen,” Eksplora Inform., vol. 8, no. 1, p. 52, 2018, doi: 10.30864/eksplora.v8i1.139.
[3] D. P. Pahrizal, “Implementasi Algoritma Rsa Untuk Pengamanan Data Berbentuk Teks,” J. Pseudocode, vol. III, no. 1, p. ISSN : 2355 – 5920, 2013.
[4] M. Azhari, D. I. Mulyana, F. J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” J. Pendidik. Sains dan Komput., vol. 2, no. 01, pp. 163–171, 2022, doi: 10.47709/jpsk.v2i01.1390.
[5] A. Hanapi and W. Pramusinto, “APLIKASI KEAMANAN DATA DENGAN KRIPTOGRAFI RC4 DAN STEGANOGRAFI EOF PADA MEDIA VIDEO DI MAN 1 JAKARTA kriptografi yang digunakan adalah algoritma Rivest Code 4 (RC4) dan steganografi dengan menggunakan metode End Of File (EOF). Kata kunci : Kriptografi, Ri,” Pros. Semin. Nas. Multidisiplin Ilmu Univ. Budi Luhur, no. April, pp. 396–404, 2017.
[6] F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Inform. Mulawarman J. Ilm. Ilmu Komput., vol. 10, no. 1, p. 20, 2016, doi: 10.30872/jim.v10i1.23.
[7] A. Eka Putri, A. Kartikadewi, and L. A. Abdul Rosyid, “Implementasi Kriptografi dengan Algoritma Advanced Encryption Standard (AES) 128 Bit dan Steganografi menggunakan Metode End of File (EOF) Berbasis Java Desktop pada Dinas Pendidikan Kabupaten Tangerang,” Appl. Inf. Syst. Manag., vol. 3, no. 2, pp. 69–78, 2021, doi: 10.15408/aism.v3i2.14722.
[8] R. Toyib and A. Wijaya, “ANALISIS PERBANDINGAN ALGORITMA SIMETRIS RIVEST CODE 5 DENGAN ALGORITMA SIMETRIS RIVEST CODE 6) (Studi Kasus : SMK Negeri Seluma),” J. Inform. Upgris, vol. 4, no. 2, pp. 203–209, 2019, doi: 10.26877/jiu.v4i2.2840.
[9] D. Hulu, B. Nadeak, and S. Aripin, “Implementasi Algoritma AES (Advanced Encryption Standard) Untuk Keamanan File Hasil Radiologi di RSU Imelda Medan,” KOMIK (Konferensi …, vol. 4, pp. 78–86, 2020, doi: 10.30865/komik.v4i1.2590.
[10] D. Nurnaningsih and A. A. Permana, “Rancangan Aplikasi Pengamanan Data Dengan Algoritma Advanced Encyption Standard (Aes),” J. Tek. Inform., vol. 11, no. 2, pp. 177–186, 2018, doi: 10.15408/jti.v11i2.7811.
[11] A. R. Tulloh et al., “Kriptografi Advanced Encryption Standard (AES) Untuk Penyandian File Dokumen Cryptography Advanced Encryption Standard (AES) for File Document Encryption,” J. Mat. UNISBA, vol. Vol 2, no. 1, pp. 1–8, 2016.
[12] A. Ilmiah, “Penerapan Enkripsi AES dan Hash SHA-512 pada Sistem Jual Beli pada Toko Besi dan Bangunan,” p. 512, 2013.
[13] I. M. W. Gede Wisnu Bhaudhayana, “Implementasi Algoritma Kriptografi Aes 256 Dan Metode Steganografi Lsb Pada Gambar Bitmap,” Angew. Chemie Int. Ed. 6(11), 951–952., vol. 3, no. 1, pp. 10–27, 2018.
[14] V. Yuniati, G. Indriyanta, and A. Rachmat C., “Enkripsi Dan Dekripsi Dengan Algoritma Aes 256 Untuk Semua Jenis File,” J. Inform., vol. 5, no. 1, 2011, doi: 10.21460/inf.2009.51.69.
[15] N. Cristy and F. Riandari, “Implementasi Metode Advanced Encryption Standard ( AES 128 Bit ) Untuk Mengamankan Data Keuangan,” J. Ilmu Komput. dan Sist. Inf., vol. 4, no. 2, pp. 75–85, 2021.
[16] M. R. Rambe, E. V. Haryanto, and A. Setiawan, “Aplikasi Pengamanan Data Dan Disisipkan Pada Gambar Dengan Algoritma Rsa Dan Modified Lsb Berbasis Android,” It (Informatic Tech. J., vol. 7, no. 1, p. 51, 2019, doi: 10.22303/it.7.1.2019.51-62.
[17] T. H. Saputro, N. H. Hidayati, and E. I. H. Ujianto, “Survei Tentang Algoritma Kriptografi Asimetris,” J. Inform. Polinema, vol. 6, no. 2, pp. 67–72, 2020, doi: 10.33795/jip.v6i2.345.

PlumX Metrics

Published
2024-11-15
How to Cite
[1]
H. Sholihat Ruhaedi and A. Rahmatulloh, “DATA SECURITY SCHEME WITH A COMBINATION OF ADVANCED ENCRYPTION STANDARD (AES) AND RIVEST SHAMIR ALDEMAN (RSA) ALGORITHMS”, antivirus, vol. 18, no. 2, pp. 177-190, Nov. 2024.