Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA
Abstract
Along with the rapid development of information technology, the ability to access and provide information to users is getting quicker and more accurate, Therefore, protecting those from any unauthorized access is very important. Cryptography can be use as they’re one of the fields of information technology development to secure data or messages that are personal and confidential. So, it takes a security to prevent things that are not desired. In this case, the message sending process will be encrypted (plaintext to ciphertext) and the recipient of the message will need to be decrypted (ciphertext to plaintext). The algorithm that we will be using are 256-bit American Encryption Standard (AES) symmetric encryption and RSA asymmetric encryption. Performance testing (size and time-process), integrity ("data integrity"), confidentiality, and "non-repudiation" of data or message security with the algorithm method above will refer to 4 (four) modern cryptographic objectives developed. Those algorithm will be used to encode data stored in document files and implementing it using Python 3.0 language and some support applications. And the results of the process of designing and testing data (text and images) obtained did not experience significant growth, but the encryption / decryption of the RSA algorithm method is much slower than the performance of the AES algorithm time-processing method
Downloads
References
[2] Stallings, William. 2013. Cryptography and Network Security : Principles and Practice Sixth Edition. Prentice Hall.
[3] Munir, Rinaldi. 2006. Kriptografi. Penerbit Informatika. Bandung
[4] Donny, Ariyus. 2007. Pengantar Ilmu Kriptografi : Teori, Analisis, dan Implementasi. Penerbit Andi Offset. Yogyakarta.
[5] Menezes, Oorchshot,& Vanstone. 1996. Handbook of Applied Cryptography. CRC Press. Florida
[6] Stinson, Douglas R. 2006. Cryptography: theory and Practice Third Edition. CRC Press. Florida.
[7] R. Shah Kruti ., Bhavika Gambhava. 2012. New Approach of Data Encryption Standard Algorithm. http://www.ijsce.org/wp-content/uploads/papers/v2i1/A0444022112.pdf. International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012
[8] Delfs, Hans & Knebl, Helmut. 2015. Introduction to cryptography principles and applications, Symmetric-key encryption. Penerbit Springer. ISBN 9783662479742
[9] Federal Information Processing Standards Publication 197. 2001. Advanced Encryption Standard (AES).
[10] Marwan Ali Albahar, Olayemi Olawumi, Keijo Haataja, Pekka Toivanen. 2018. Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption. Journal of Information Security, 2018, 9, 168-176 https://file.scirp.org/pdf/JIS_2018040814373482.pdf. ISSN Online: 2153-1242
[12] Prabhakar Telagarapu Birendra Biswal Vijaya Santhi Guntuk. 2011. Design and Analysis of Multimedia Communication System. IEEE- Third International Conference on Advanced Computing, ICoAC 2011 MIT, Anna University, Chennai. December 14-16, 2011
Copyright (c) 2018 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright in each article belongs to the author
- The author acknowledges that the RESTI Journal (System Engineering and Information Technology) is the first publisher to publish with a license Creative Commons Attribution 4.0 International License.
- Authors can enter writing separately, arrange the non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional repository, publication in a book, etc.), by acknowledging that the manuscript has been published for the first time in the RESTI (Rekayasa Sistem dan Teknologi Informasi) journal ;