I. M. D. S. Atmaja, I. Astawa, N. Wisswani, I. Nugroho, P. Sunu, I. K. Wiratama
{"title":"采用非对称RSA加密技术进行文档加密","authors":"I. M. D. S. Atmaja, I. Astawa, N. Wisswani, I. Nugroho, P. Sunu, I. K. Wiratama","doi":"10.1109/iCAST51016.2020.9557723","DOIUrl":null,"url":null,"abstract":"With advances in technology like today, documents can be sent digitally via the internet media. An important problem faced in sending digital documents is that often documents sent can be accessed by parties who do not have the authority over these documents. The solution to this problem is to secure digital documents before transmission. One of the methods to secure data is cryptography. Cryptography with asymmetric keys is the strongest data security technique to use. One of the most widely used asymmetric cryptography is the RSA (Rivest-Shamir-Adleman) algorithm. The type of document that is encrypted is the most commonly attached document when sent e-mails. The document types are .docx, .pptx, .xlsx, .pdf, .jpg and .mp4. In the encryption process, a public key and a private key will be generated which can be sent separately by sending encrypted digital documents. The decryption process for digital documents is carried out from the receiving end of the document using a private key generated in the encryption process. The encryption result has a size larger than the original file size because it has been encoded in another form according to the RSA algorithm. The longer and bigger the input size, the longer it will take required for encryption.","PeriodicalId":334854,"journal":{"name":"2020 International Conference on Applied Science and Technology (iCAST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Document Encryption Through Asymmetric RSA Cryptography\",\"authors\":\"I. M. D. S. Atmaja, I. Astawa, N. Wisswani, I. Nugroho, P. Sunu, I. K. Wiratama\",\"doi\":\"10.1109/iCAST51016.2020.9557723\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With advances in technology like today, documents can be sent digitally via the internet media. An important problem faced in sending digital documents is that often documents sent can be accessed by parties who do not have the authority over these documents. The solution to this problem is to secure digital documents before transmission. One of the methods to secure data is cryptography. Cryptography with asymmetric keys is the strongest data security technique to use. One of the most widely used asymmetric cryptography is the RSA (Rivest-Shamir-Adleman) algorithm. The type of document that is encrypted is the most commonly attached document when sent e-mails. The document types are .docx, .pptx, .xlsx, .pdf, .jpg and .mp4. In the encryption process, a public key and a private key will be generated which can be sent separately by sending encrypted digital documents. The decryption process for digital documents is carried out from the receiving end of the document using a private key generated in the encryption process. The encryption result has a size larger than the original file size because it has been encoded in another form according to the RSA algorithm. The longer and bigger the input size, the longer it will take required for encryption.\",\"PeriodicalId\":334854,\"journal\":{\"name\":\"2020 International Conference on Applied Science and Technology (iCAST)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Applied Science and Technology (iCAST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iCAST51016.2020.9557723\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Applied Science and Technology (iCAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iCAST51016.2020.9557723","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Document Encryption Through Asymmetric RSA Cryptography
With advances in technology like today, documents can be sent digitally via the internet media. An important problem faced in sending digital documents is that often documents sent can be accessed by parties who do not have the authority over these documents. The solution to this problem is to secure digital documents before transmission. One of the methods to secure data is cryptography. Cryptography with asymmetric keys is the strongest data security technique to use. One of the most widely used asymmetric cryptography is the RSA (Rivest-Shamir-Adleman) algorithm. The type of document that is encrypted is the most commonly attached document when sent e-mails. The document types are .docx, .pptx, .xlsx, .pdf, .jpg and .mp4. In the encryption process, a public key and a private key will be generated which can be sent separately by sending encrypted digital documents. The decryption process for digital documents is carried out from the receiving end of the document using a private key generated in the encryption process. The encryption result has a size larger than the original file size because it has been encoded in another form according to the RSA algorithm. The longer and bigger the input size, the longer it will take required for encryption.