RANCANG BANGUN APLIKASI PENGIRIMAN DOKUMEN MENGGUNAKAN KOMBINASI ALGORITMA RSA DAN ALGORITMA XOR

L. Refialy
{"title":"RANCANG BANGUN APLIKASI PENGIRIMAN DOKUMEN MENGGUNAKAN KOMBINASI ALGORITMA RSA DAN ALGORITMA XOR","authors":"L. Refialy","doi":"10.34010/komputa.v11i1.6905","DOIUrl":null,"url":null,"abstract":"Digital data or documents in the exchange process in a network, must be completely safe, intact, and always kept confidential, this is the background for the need for a system that can guarantee the security and confidentiality of the data and documents in the data transfer process. This research makes a design of a data security program in sending documents using the RSA cryptographic algorithm and the XOR algorithm. The RSA algorithm involves two keys in encryption, namely the public key and the private key. The public key can be distributed to various parties to perform encryption or decryption. Messages that have been encrypted with the public key can only be decrypted using the private key. XOR algorithm is a cryptographic technique (encoding) data that uses the principle of XOR logic in the encryption and description process. Analysis of the Encryption Process and Description of the XOR method The encryption algorithm using XOR is to XOR plaintext (P) with key (K) to produce ciphertext. By using the prototype method in carrying out the research stages, the applications built have undergone adjustments according to requests/input from application users. The application can run well because it can encrypt and decrypt documents in sending email from within the application. Then from the test results obtained the greater the bit strength of the key, the greater the processing time required to generate the key, secondly the larger the file size, the greater the processing time required for encryption/decryption. The file format does not affect the processing time, and thirdly, the greater the bit strength, the faster the encryption time","PeriodicalId":346733,"journal":{"name":"Komputa : Jurnal Ilmiah Komputer dan Informatika","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Komputa : Jurnal Ilmiah Komputer dan Informatika","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.34010/komputa.v11i1.6905","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Digital data or documents in the exchange process in a network, must be completely safe, intact, and always kept confidential, this is the background for the need for a system that can guarantee the security and confidentiality of the data and documents in the data transfer process. This research makes a design of a data security program in sending documents using the RSA cryptographic algorithm and the XOR algorithm. The RSA algorithm involves two keys in encryption, namely the public key and the private key. The public key can be distributed to various parties to perform encryption or decryption. Messages that have been encrypted with the public key can only be decrypted using the private key. XOR algorithm is a cryptographic technique (encoding) data that uses the principle of XOR logic in the encryption and description process. Analysis of the Encryption Process and Description of the XOR method The encryption algorithm using XOR is to XOR plaintext (P) with key (K) to produce ciphertext. By using the prototype method in carrying out the research stages, the applications built have undergone adjustments according to requests/input from application users. The application can run well because it can encrypt and decrypt documents in sending email from within the application. Then from the test results obtained the greater the bit strength of the key, the greater the processing time required to generate the key, secondly the larger the file size, the greater the processing time required for encryption/decryption. The file format does not affect the processing time, and thirdly, the greater the bit strength, the faster the encryption time
用RSA算法和XOR算法组合编写文档提交应用程序
数字数据或文件在网络中的交换过程中,必须是完全安全、完整、并始终保密的,这就是需要一个能够保证数据和文件在数据传输过程中的安全性和保密性的系统的背景。本研究设计了一个采用RSA加密算法和异或算法发送文档的数据安全程序。RSA算法涉及两个密钥进行加密,即公钥和私钥。公钥可以分发给各方执行加密或解密。已使用公钥加密的消息只能使用私钥解密。异或算法是在加密和描述过程中利用异或逻辑原理对数据进行加密(编码)的一种加密技术。使用异或的加密算法是将明文(P)与密钥(K)进行异或,生成密文。通过在研究阶段使用原型方法,构建的应用程序已根据应用程序用户的要求/输入进行了调整。应用程序可以很好地运行,因为它可以在应用程序内部发送电子邮件时加密和解密文档。然后从测试结果中得出,密钥的位强度越大,生成密钥所需的处理时间就越大,其次文件大小越大,加密/解密所需的处理时间就越大。文件格式不影响处理时间,第三,比特强度越大,加密时间越快
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信