{"title":"用RSA算法和XOR算法组合编写文档提交应用程序","authors":"L. Refialy","doi":"10.34010/komputa.v11i1.6905","DOIUrl":null,"url":null,"abstract":"Digital data or documents in the exchange process in a network, must be completely safe, intact, and always kept confidential, this is the background for the need for a system that can guarantee the security and confidentiality of the data and documents in the data transfer process. This research makes a design of a data security program in sending documents using the RSA cryptographic algorithm and the XOR algorithm. The RSA algorithm involves two keys in encryption, namely the public key and the private key. The public key can be distributed to various parties to perform encryption or decryption. Messages that have been encrypted with the public key can only be decrypted using the private key. XOR algorithm is a cryptographic technique (encoding) data that uses the principle of XOR logic in the encryption and description process. Analysis of the Encryption Process and Description of the XOR method The encryption algorithm using XOR is to XOR plaintext (P) with key (K) to produce ciphertext. By using the prototype method in carrying out the research stages, the applications built have undergone adjustments according to requests/input from application users. The application can run well because it can encrypt and decrypt documents in sending email from within the application. Then from the test results obtained the greater the bit strength of the key, the greater the processing time required to generate the key, secondly the larger the file size, the greater the processing time required for encryption/decryption. The file format does not affect the processing time, and thirdly, the greater the bit strength, the faster the encryption time","PeriodicalId":346733,"journal":{"name":"Komputa : Jurnal Ilmiah Komputer dan Informatika","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"RANCANG BANGUN APLIKASI PENGIRIMAN DOKUMEN MENGGUNAKAN KOMBINASI ALGORITMA RSA DAN ALGORITMA XOR\",\"authors\":\"L. Refialy\",\"doi\":\"10.34010/komputa.v11i1.6905\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital data or documents in the exchange process in a network, must be completely safe, intact, and always kept confidential, this is the background for the need for a system that can guarantee the security and confidentiality of the data and documents in the data transfer process. This research makes a design of a data security program in sending documents using the RSA cryptographic algorithm and the XOR algorithm. The RSA algorithm involves two keys in encryption, namely the public key and the private key. The public key can be distributed to various parties to perform encryption or decryption. Messages that have been encrypted with the public key can only be decrypted using the private key. XOR algorithm is a cryptographic technique (encoding) data that uses the principle of XOR logic in the encryption and description process. Analysis of the Encryption Process and Description of the XOR method The encryption algorithm using XOR is to XOR plaintext (P) with key (K) to produce ciphertext. By using the prototype method in carrying out the research stages, the applications built have undergone adjustments according to requests/input from application users. The application can run well because it can encrypt and decrypt documents in sending email from within the application. Then from the test results obtained the greater the bit strength of the key, the greater the processing time required to generate the key, secondly the larger the file size, the greater the processing time required for encryption/decryption. The file format does not affect the processing time, and thirdly, the greater the bit strength, the faster the encryption time\",\"PeriodicalId\":346733,\"journal\":{\"name\":\"Komputa : Jurnal Ilmiah Komputer dan Informatika\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Komputa : Jurnal Ilmiah Komputer dan Informatika\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.34010/komputa.v11i1.6905\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Komputa : Jurnal Ilmiah Komputer dan Informatika","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.34010/komputa.v11i1.6905","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
RANCANG BANGUN APLIKASI PENGIRIMAN DOKUMEN MENGGUNAKAN KOMBINASI ALGORITMA RSA DAN ALGORITMA XOR
Digital data or documents in the exchange process in a network, must be completely safe, intact, and always kept confidential, this is the background for the need for a system that can guarantee the security and confidentiality of the data and documents in the data transfer process. This research makes a design of a data security program in sending documents using the RSA cryptographic algorithm and the XOR algorithm. The RSA algorithm involves two keys in encryption, namely the public key and the private key. The public key can be distributed to various parties to perform encryption or decryption. Messages that have been encrypted with the public key can only be decrypted using the private key. XOR algorithm is a cryptographic technique (encoding) data that uses the principle of XOR logic in the encryption and description process. Analysis of the Encryption Process and Description of the XOR method The encryption algorithm using XOR is to XOR plaintext (P) with key (K) to produce ciphertext. By using the prototype method in carrying out the research stages, the applications built have undergone adjustments according to requests/input from application users. The application can run well because it can encrypt and decrypt documents in sending email from within the application. Then from the test results obtained the greater the bit strength of the key, the greater the processing time required to generate the key, secondly the larger the file size, the greater the processing time required for encryption/decryption. The file format does not affect the processing time, and thirdly, the greater the bit strength, the faster the encryption time