Comparison of algorithm RSA with algorithm Blowfish in Data Security Application Design

Authors

  • Ade Rahayu STMIK Kaputama, Binjai, Sumatera Utara
  • Amanda Putri Ardana STMIK Kaputama, Binjai, Sumatera Utara
  • Chika Pramudhita STMIK Kaputama, Binjai, Sumatera Utara
  • Dea Syafitri STMIK Kaputama, Binjai, Sumatera Utara
  • Rianty Zabitha Siregar STMIK Kaputama, Binjai, Sumatera Utara

DOI:

https://doi.org/10.63893/matech.v3i2.224

Keywords:

algorithm RSA, algoritmh Blowfish, Keamanan Data

Abstract

In the development of information technology that is increasingly high and increasing, as well as sophisticated times like this, tools are needed to send messages, including many media such as chat, line or the like so that we can send messages quickly and vice versa. Of all the conveniences that will certainly be very influential when we will send messages whose contents only certain people who have the right to know the contents. One that must be really vigilant and careful is a message that is confidential because if the message is spread it will have a bad impact on ourselves or others. Beberapacara can be used, one of them by securing information data by using cryptographic concepts related to information security aspects, the integrity of a data. The cryptography algorithm that will be used to solve the problem of securing information or data is by using RSA method and Blowfish algorithm method. Encryption results from the word UPI YPTK obtained results by using the RSA method that is obtained decimal results: 98 135 98 0 113 9 9 84 98 34 98 0 98 49 113 135, and the result of the encryption process using the Blowfish algorithm is Ü|*œ / 9".

References

Arief, A., & Saputra, D. R. (2016). Implementasi Kriptografi Kunci Publik dengan Algoritma RSA-CRT pada Aplikasi Instant Messaging. Scientific Journal of Informatics, 3(1). http://journal.unnes.ac.id/nju/index.php/sji

A. Yasinta, “Implementasi Algoritma Vigenere Cipher dan RSA Rebalanced pada Pengamanan Citra dalam Skema Kriptografi Hybrid,” 2018.

D. Apdillah, H. F. Siregar, and H. Swanda, “Penerapan Kriptografi RSA Dalam Mengamankan File Teks Berbasis PHP,” vol. 2, no. 1, pp. 45–52, 2018.

Jamaludin. (2018). Rancang Bangun Kombinasi Hill Cipher dan RSA Menggunakan Metode Hybrid Cryptosystem. Sinkron.

M. Ridwan and Z. Arifin, “Rancang Bangun E-Voting Dengan Menggunakan Keamanan Algoritma Rivest Shamir Adleman ( RSA ) Berbasis WEB ( Studi Kasus : Pemilihan Ketua Bem Fmipa ),” vol. 11, no. 2, pp. 22–28, 2016.

Rachman, T. (2015). Sistem Keamanan Data Menggunakan Algoritma Blowfish Dengan Kunci Simetrik. STT STIKMA Internasional Malang, 1(1).

Rahajoeningroem, T., & Aria, M. (2018). Studi Dan Implementasi Algoritma RSA Untuk Pengamanan Data Transkrip Akademik Mahasiswa. Majalah Ilmiah Unicom.

S. Wardoyo, Z. Imanullah, and R. Fahrizal, “ENKRIPSI DAN DEKRIPSI FILE DENGAN ALGORITMA BLOWFISH PADA PERANGKAT MOBILE BERBASIS ANDROID,” no. 1, 2016.

Sitinjak, S., Fauziah, Y., & Juwairiah. (2014). Aplikasi Kriptografi File Menggunakan Algoritma Blowfish. Seminar Informatika, 1(1), 78–86.

Y. P. Astuti, E. H. Rachmawanto, C. A. Sari, F. I. Komputer, and U. D. Nuswantoro, “Optimasi Enkripsi Password Menggunakan Algortima Blowfish,” vol. 15, no. 1, pp. 15–21, 2016.

Additional Files

Published

2024-09-19

How to Cite

Rahayu, A. ., Ardana, A. P. ., Pramudhita, C. ., Syafitri, D., & Siregar, R. Z. . (2024). Comparison of algorithm RSA with algorithm Blowfish in Data Security Application Design . Journal of Mathematics and Technology (MATECH), 3(2), 213–219. https://doi.org/10.63893/matech.v3i2.224