Hybrid Cryptosystem Analysis RSA Algorithm And Triple DES Algorithm

Authors

  • Liana Student of Computer Science, University of North Sumatra, Medan, Indonesia
  • Muhammad Zarlis Department of Computer Science, University of North Sumatera, Medan, Indonesia
  • Tulus Department of Mathematic, University of North Sumatra, Medan, Indonesia

DOI:

10.33395/sinkron.v8i3.12467

Keywords:

Super Encryption Algorithm Triple DES, RSA Algorithm

Abstract

Data security is needed in terms of communication. To guarantee data security, a technique is needed to make data and information called Critography. This study aims to analyze the process of Super Encryption in symmetric and asymmetric criterias using the Triple DES Algorithm and the RSA Algorithm. This can improve data security so that data is more confidential. The method used in Triple DES which is also called the symmetric algorithm is the OFB (Output feeback) method, and the RSA Algorithm (Riverst - Shamir-Adleman) which is an asymmetric algorithm using a random number system so that when these two algorithms are combined in the Super Encryption process the more accurate the data security. Super DES Triple Encryption and RSA algorithm analysis shows that the data created by text will be encrypted into ciphertext using both methods and re-described, so that the security of the data is relatively safe. Super Encryption on the two methods Algorithm is done because the level of complexity is difficult to make Cryptanalysts to steal data and the Encryption process becomes slow but data security becomes safer and not easy to attack Cryptanalysts. The problem in this research is how to increase encryption security and speed up the encryption process by combining the RSA and Triple DES methods.

GS Cited Analysis

Downloads

Download data is not yet available.

Author Biographies

Liana, Student of Computer Science, University of North Sumatra, Medan, Indonesia

 

 

Muhammad Zarlis, Department of Computer Science, University of North Sumatera, Medan, Indonesia

 

 

Tulus, Department of Mathematic, University of North Sumatra, Medan, Indonesia

 

 

References

Ariyus, Dony. 2008. Pengantar Ilmu Kriptografi: Teori, Analisis dan Implementasi. Penerbit Andi: Yogyakarta.

Ariyus, Dony. 2006. Computer Security. Penerbit Andi: Yogyakarta.

Chan, Sasmita, Adhytio & Ginting Muthe, Permana 2014. Perancangan Aplikasi Pengamanan File dengan Memanfaatkan USB Flashdisk Sebagai Kunci Menggunan Algoritma Triple DES. ISSN: 2301-9425

Chmielowiec, D. 2010. Fixed Point Of The RSA Encrytion ALgorithm. Elvesier Theoretical Computer Science: 411: 288-292

Karkarla, Veenannand & Govind, N.S. 2012. FPGA Implementation of Hybird Encryption Algorithm Based on triple DES and RSA in Bluetooth Communication. International Journal of Applied Research & Studies: 2278-9480

Kim, S. & Lee, G. 2006. Secure Verifiable Non- interactive Oblivious Transfer Protocol Using RSA and Bit Commitment On Distributed Envirotment, Elsevier

Kromodimoeljo, Sentot. 2010. Teori & Aplikasi Kriptografi, SPK IT Consulting

Kurniawan, Yusuf. 2004. Kriptografi. Keamanan Internet dan jaringan Komunikasi. Penerbit Informatika. Bandung.

Madhur, Kapil., Yadav, Singh, Jitendra. & Vijay, Ashish. 2012. Modified Elgamal over RSA Digital Signature Algorithm (MERDSA). International Journal of Advanced Research in Computer Science and Software Engeneering(1): 2277-128X

Mahajan, Sonam & Sigh, Maninder. 2014. Performance Analysis of Efficient RSA Text Encrytion Using NVIDIA Cude – C and Open CL. Proceeding of the 2014 International Conference on interdisciplinary Adveances in Applied Computing – ICONIAAC ’14 31:1-6.

Mollin, Richard. 2007. An Introduction to Cryptography, Taylor & Francis Group

Munir, Rinaldi. 2006. Kriptografi. Penerbit informatika, Bandung

Narula, Sigh, Mandeep & Singh, Simarpreet. 2014. Implementation of Triple Data Encrytion Standart using verilog. International Journal of Advanced Research in Computer Science and Software Engeneering(1): 2277-128X

Parsi K.2012. Data Security in cloud computing using RSA Algorithm. International Journal of Research in computer & Communication Technology,1(4) : 143-146

PuCha, ZHONG & WanSu, BAO, 2012. Quantum menhanical meet-in-the-middle search algorithm for Triple DES. Chinese Science Bulletin(3): 321-325

Pratama, Aditya. 2011. Pembangkit Bilangan Acak Semu. Kriptografi: IF3058

Sadikin, Rifki. 2012. Kriptografi untuk keamanan jaringan, CV Andi Offset, Yogyakarta

Talbot, Jhon dan Dominic Welsh. 2006. Complexity and Crytography. USA : Cambridge University Press.

Thao. 2014. A Visualization Tool For The RSA Cipher. Proceeding of the ACM National Science Foundation under grants DUE-1140512, DUE-1245310 and IIS=1319363: Departement of Computer Science Michigan Technological Universitas Houghton, MI.USA.

Wang, H., Song, Z., Niu, X. & Ding, Q. 2013. Key Generation Research of RSA Public Crytosystem and Matlab Imp[lement. International Conference on sensor Network Security Technology and Privacy Communication System (SNS & PCS): 18 : 125 – 129.

Zainal, 2009. Studi Kasus Penggunaan Algoritma RSA sebagai Algoritma Kritografi yang aman. Jurnal Informatika Mulawarman. ( 3 September 2009).

Downloads


Crossmark Updates

How to Cite

Liana, L., Zarlis, M. ., & Tulus, T. (2023). Hybrid Cryptosystem Analysis RSA Algorithm And Triple DES Algorithm. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 7(3), 1461-1473. https://doi.org/10.33395/sinkron.v8i3.12467

Most read articles by the same author(s)

1 2 > >>