Hybrid Cryptosystem Analysis RSA Algorithm And Triple DES Algorithm
DOI:
10.33395/sinkron.v8i3.12467Keywords:
Super Encryption Algorithm Triple DES, RSA AlgorithmAbstract
Data security is needed in terms of communication. To guarantee data security, a technique is needed to make data and information called Critography. This study aims to analyze the process of Super Encryption in symmetric and asymmetric criterias using the Triple DES Algorithm and the RSA Algorithm. This can improve data security so that data is more confidential. The method used in Triple DES which is also called the symmetric algorithm is the OFB (Output feeback) method, and the RSA Algorithm (Riverst - Shamir-Adleman) which is an asymmetric algorithm using a random number system so that when these two algorithms are combined in the Super Encryption process the more accurate the data security. Super DES Triple Encryption and RSA algorithm analysis shows that the data created by text will be encrypted into ciphertext using both methods and re-described, so that the security of the data is relatively safe. Super Encryption on the two methods Algorithm is done because the level of complexity is difficult to make Cryptanalysts to steal data and the Encryption process becomes slow but data security becomes safer and not easy to attack Cryptanalysts. The problem in this research is how to increase encryption security and speed up the encryption process by combining the RSA and Triple DES methods.
Downloads
References
Ariyus, Dony. 2008. Pengantar Ilmu Kriptografi: Teori, Analisis dan Implementasi. Penerbit Andi: Yogyakarta.
Ariyus, Dony. 2006. Computer Security. Penerbit Andi: Yogyakarta.
Chan, Sasmita, Adhytio & Ginting Muthe, Permana 2014. Perancangan Aplikasi Pengamanan File dengan Memanfaatkan USB Flashdisk Sebagai Kunci Menggunan Algoritma Triple DES. ISSN: 2301-9425
Chmielowiec, D. 2010. Fixed Point Of The RSA Encrytion ALgorithm. Elvesier Theoretical Computer Science: 411: 288-292
Karkarla, Veenannand & Govind, N.S. 2012. FPGA Implementation of Hybird Encryption Algorithm Based on triple DES and RSA in Bluetooth Communication. International Journal of Applied Research & Studies: 2278-9480
Kim, S. & Lee, G. 2006. Secure Verifiable Non- interactive Oblivious Transfer Protocol Using RSA and Bit Commitment On Distributed Envirotment, Elsevier
Kromodimoeljo, Sentot. 2010. Teori & Aplikasi Kriptografi, SPK IT Consulting
Kurniawan, Yusuf. 2004. Kriptografi. Keamanan Internet dan jaringan Komunikasi. Penerbit Informatika. Bandung.
Madhur, Kapil., Yadav, Singh, Jitendra. & Vijay, Ashish. 2012. Modified Elgamal over RSA Digital Signature Algorithm (MERDSA). International Journal of Advanced Research in Computer Science and Software Engeneering(1): 2277-128X
Mahajan, Sonam & Sigh, Maninder. 2014. Performance Analysis of Efficient RSA Text Encrytion Using NVIDIA Cude – C and Open CL. Proceeding of the 2014 International Conference on interdisciplinary Adveances in Applied Computing – ICONIAAC ’14 31:1-6.
Mollin, Richard. 2007. An Introduction to Cryptography, Taylor & Francis Group
Munir, Rinaldi. 2006. Kriptografi. Penerbit informatika, Bandung
Narula, Sigh, Mandeep & Singh, Simarpreet. 2014. Implementation of Triple Data Encrytion Standart using verilog. International Journal of Advanced Research in Computer Science and Software Engeneering(1): 2277-128X
Parsi K.2012. Data Security in cloud computing using RSA Algorithm. International Journal of Research in computer & Communication Technology,1(4) : 143-146
PuCha, ZHONG & WanSu, BAO, 2012. Quantum menhanical meet-in-the-middle search algorithm for Triple DES. Chinese Science Bulletin(3): 321-325
Pratama, Aditya. 2011. Pembangkit Bilangan Acak Semu. Kriptografi: IF3058
Sadikin, Rifki. 2012. Kriptografi untuk keamanan jaringan, CV Andi Offset, Yogyakarta
Talbot, Jhon dan Dominic Welsh. 2006. Complexity and Crytography. USA : Cambridge University Press.
Thao. 2014. A Visualization Tool For The RSA Cipher. Proceeding of the ACM National Science Foundation under grants DUE-1140512, DUE-1245310 and IIS=1319363: Departement of Computer Science Michigan Technological Universitas Houghton, MI.USA.
Wang, H., Song, Z., Niu, X. & Ding, Q. 2013. Key Generation Research of RSA Public Crytosystem and Matlab Imp[lement. International Conference on sensor Network Security Technology and Privacy Communication System (SNS & PCS): 18 : 125 – 129.
Zainal, 2009. Studi Kasus Penggunaan Algoritma RSA sebagai Algoritma Kritografi yang aman. Jurnal Informatika Mulawarman. ( 3 September 2009).
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2023 Liana, Muhammad Zarlis, Tulus
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.