Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Keamanan Data melalui Enkripsi Studi Kasus dengan Algoritma RSA

View through CrossRef
Data security is a critical aspect in the digital era due to the increasing exchange of sensitive information through electronic media. One widely used approach to protect data confidentiality is cryptography, particularly asymmetric encryption algorithms. This study aims to analyze the implementation of the Rivest–Shamir–Adleman (RSA) algorithm as a data security mechanism through an encryption and decryption process. The research method used is an experimental approach by implementing the RSA algorithm in a text-based data security simulation. The stages include key generation, encryption, and decryption processes, followed by analysis of the correctness and effectiveness of the algorithm in maintaining data confidentiality. The results show that the RSA algorithm is capable of converting plaintext into unreadable ciphertext and successfully restoring it to its original form through the decryption process using the correct private key. This confirms that RSA provides a high level of security based on the difficulty of factoring large prime numbers. The implication of this study is that the RSA algorithm can be effectively applied to secure sensitive data transmission in information systems, especially in environments requiring strong authentication and confidentiality.
Title: Keamanan Data melalui Enkripsi Studi Kasus dengan Algoritma RSA
Description:
Data security is a critical aspect in the digital era due to the increasing exchange of sensitive information through electronic media.
One widely used approach to protect data confidentiality is cryptography, particularly asymmetric encryption algorithms.
This study aims to analyze the implementation of the Rivest–Shamir–Adleman (RSA) algorithm as a data security mechanism through an encryption and decryption process.
The research method used is an experimental approach by implementing the RSA algorithm in a text-based data security simulation.
The stages include key generation, encryption, and decryption processes, followed by analysis of the correctness and effectiveness of the algorithm in maintaining data confidentiality.
The results show that the RSA algorithm is capable of converting plaintext into unreadable ciphertext and successfully restoring it to its original form through the decryption process using the correct private key.
This confirms that RSA provides a high level of security based on the difficulty of factoring large prime numbers.
The implication of this study is that the RSA algorithm can be effectively applied to secure sensitive data transmission in information systems, especially in environments requiring strong authentication and confidentiality.

Related Results

IMPLEMENTASI VERIFIKASI TEKS MENGGUNAKAN METODE RIVEST SHAMIR ADLEMAN (RSA)
IMPLEMENTASI VERIFIKASI TEKS MENGGUNAKAN METODE RIVEST SHAMIR ADLEMAN (RSA)
Perkembangan teknologi dan sistem jaringan saat ini mengalami peningkatan secara signifikan, terutama dalam aspek keamanan. Keamanan jaringan setidaknya memiliki dua syarat, yaitu ...
Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Rhizome-rooted alfalfa (Medicago sativa L.) is an excellent forage for establishing grazing and ecological grasslands, requiring a high and stable yield. Studying the genetic and p...
ENKRIPSI DATA AUDIO MENGGUNAKAN METODE KRIPTOGRAFI RSA
ENKRIPSI DATA AUDIO MENGGUNAKAN METODE KRIPTOGRAFI RSA
Penerapan Metode RSA pada Enkripsi Data Audio, merupakan bentuk penelitian untuk membuktikan bahwa Metode Kriptografi dapat digunakan untuk pencarian solusi, khususnya pada permasa...
ARTIKEL ALGORITMA PEMROGRAMAN SERI MINTA UBA HASIBUAN
ARTIKEL ALGORITMA PEMROGRAMAN SERI MINTA UBA HASIBUAN
Algoritma merupakan akar dari sebuah sistem yang terbentuk dalam dunia pemrograman.Melalui serangkaian cara yang masuk akal dan teratur, sebuah algoritma dapat menyelesaikan suatu ...
Perbandingan Algoritma Kriptografi Modern dalam Melindungi Data Transmisi
Perbandingan Algoritma Kriptografi Modern dalam Melindungi Data Transmisi
Keamanan data transmisi merupakan aspek penting dalam sistem informasi modern seiring meningkatnya pertukaran data melalui jaringan terbuka. Berbagai ancaman seperti penyadapan, ma...
FAKTOR-FAKTOR YANG MEMPENGARUHI MORTALITAS PADA PASIEN DENGAN FRAKTUR COSTA: Literature Review
FAKTOR-FAKTOR YANG MEMPENGARUHI MORTALITAS PADA PASIEN DENGAN FRAKTUR COSTA: Literature Review
FAKTOR-FAKTOR YANG MEMPENGARUHI MORTALITAS PADA PASIEN DENGAN FRAKTUR COSTA: Literature  Review Anna Tri Wahyuni1), Masfuri2),  Liya Arista3)1,2,3 Fakultas Ilmu Keperawatan Univers...
Perbandingan Kinerja Algoritma Naïve Bayes Dan C.45 Dalam Klasifikasi Spam Email
Perbandingan Kinerja Algoritma Naïve Bayes Dan C.45 Dalam Klasifikasi Spam Email
Antispam dengan algoritma tertentu yang dapat memisahkan antara spam-mail dengan non spam mail. Perbandingan kinerja antara algoritma naïve bayes, dan decision tree yang memakai al...
Implementasi dan Evaluasi Keamanan Data at Rest Menggunakan BitLocker dan VeraCrypt
Implementasi dan Evaluasi Keamanan Data at Rest Menggunakan BitLocker dan VeraCrypt
Keamanan data at rest merupakan aspek krusial dalam perlindungan informasi digital, khususnya pada perangkat penyimpanan yang rentan terhadap akses tidak sah akibat pencurian, kehi...

Back to Top