Comparison of algorithm RSA with algorithm Blowfish in Data Security Application Design
DOI:
https://doi.org/10.63893/matech.v3i2.224Keywords:
algorithm RSA, algoritmh Blowfish, Keamanan DataAbstract
In the development of information technology that is increasingly high and increasing, as well as sophisticated times like this, tools are needed to send messages, including many media such as chat, line or the like so that we can send messages quickly and vice versa. Of all the conveniences that will certainly be very influential when we will send messages whose contents only certain people who have the right to know the contents. One that must be really vigilant and careful is a message that is confidential because if the message is spread it will have a bad impact on ourselves or others. Beberapacara can be used, one of them by securing information data by using cryptographic concepts related to information security aspects, the integrity of a data. The cryptography algorithm that will be used to solve the problem of securing information or data is by using RSA method and Blowfish algorithm method. Encryption results from the word UPI YPTK obtained results by using the RSA method that is obtained decimal results: 98 135 98 0 113 9 9 84 98 34 98 0 98 49 113 135, and the result of the encryption process using the Blowfish algorithm is Ü|*œ / 9".
References
Arief, A., & Saputra, D. R. (2016). Implementasi Kriptografi Kunci Publik dengan Algoritma RSA-CRT pada Aplikasi Instant Messaging. Scientific Journal of Informatics, 3(1). http://journal.unnes.ac.id/nju/index.php/sji
A. Yasinta, “Implementasi Algoritma Vigenere Cipher dan RSA Rebalanced pada Pengamanan Citra dalam Skema Kriptografi Hybrid,” 2018.
D. Apdillah, H. F. Siregar, and H. Swanda, “Penerapan Kriptografi RSA Dalam Mengamankan File Teks Berbasis PHP,” vol. 2, no. 1, pp. 45–52, 2018.
Jamaludin. (2018). Rancang Bangun Kombinasi Hill Cipher dan RSA Menggunakan Metode Hybrid Cryptosystem. Sinkron.
M. Ridwan and Z. Arifin, “Rancang Bangun E-Voting Dengan Menggunakan Keamanan Algoritma Rivest Shamir Adleman ( RSA ) Berbasis WEB ( Studi Kasus : Pemilihan Ketua Bem Fmipa ),” vol. 11, no. 2, pp. 22–28, 2016.
Rachman, T. (2015). Sistem Keamanan Data Menggunakan Algoritma Blowfish Dengan Kunci Simetrik. STT STIKMA Internasional Malang, 1(1).
Rahajoeningroem, T., & Aria, M. (2018). Studi Dan Implementasi Algoritma RSA Untuk Pengamanan Data Transkrip Akademik Mahasiswa. Majalah Ilmiah Unicom.
S. Wardoyo, Z. Imanullah, and R. Fahrizal, “ENKRIPSI DAN DEKRIPSI FILE DENGAN ALGORITMA BLOWFISH PADA PERANGKAT MOBILE BERBASIS ANDROID,” no. 1, 2016.
Sitinjak, S., Fauziah, Y., & Juwairiah. (2014). Aplikasi Kriptografi File Menggunakan Algoritma Blowfish. Seminar Informatika, 1(1), 78–86.
Y. P. Astuti, E. H. Rachmawanto, C. A. Sari, F. I. Komputer, and U. D. Nuswantoro, “Optimasi Enkripsi Password Menggunakan Algortima Blowfish,” vol. 15, no. 1, pp. 15–21, 2016.
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Dea Syafitri, Ade Rahayu, Amanda Putri Ardana, Chika Pramudhita, Rianty Zabitha Siregar

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
<p><a href="http://creativecommons.org/licenses/by-nc-sa/4.0/" rel="license"><img style="border-width: 0;" src="https://i.creativecommons.org/l/by-nc-sa/4.0/88x31.png" alt="Creative Commons License" /></a><br /><strong>MATECH</strong> This work is licensed under a <a href="http://creativecommons.org/licenses/by-nc-sa/4.0/" rel="license">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License</a>.</p>