Analisis Performa dari Algoritma Kriptografi RSA dan ElGamal dalam Enkripsi dan Dekripsi Pesan
(1) Universitas Surabaya, Indonesia
(2) Universitas Surabaya, Indonesia
(3) Universitas Surabaya, Indonesia
(*) Corresponding Author
Abstract
Full Text:
PDFReferences
R. Verma and J. Dhiman, “Implementation of Improved Cryptography Algorithm,” International Journal of Information Technology and Computer Science, vol. 14, no. 2, pp. 45–53, Apr. 2022, doi: 10.5815/ijitcs.2022.02.04.
F. Mallouli, A. Hellal, N. Sharief Saeed, and F. Abdulraheem Alzahrani, “A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms,” in Proceedings - 6th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2019 and 5th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019, Jun. 2019, pp. 173–176. doi: 10.1109/CSCloud/EdgeCom.2019.00022.
Y. Ma, C. Li, and B. Ou, “Cryptanalysis of an image block encryption algorithm based on chaotic maps,” Journal of Information Security and Applications, vol. 54, Oct. 2020, doi: 10.1016/j.jisa.2020.102566.
R. Adi Putra and E. R. Prasetyo, “Android-Based Text Message Encryption and Decryption Application Using the Advanced Encryption Standard Algorithm,” Jurnal Media Computer Science, vol. 2, no. 1, pp. 57–62, 2023.
D. Rachmawati and M. A. Budiman, “On Using the First Variant of Dependent RSA Encryption Scheme to Secure Text: A Tutorial,” in Journal of Physics: Conference Series, Jun. 2020, vol. 1542, no. 1. doi: 10.1088/1742-6596/1542/1/012024.
A. Hamza and B. Kumar, “A Review Paper on DES, AES, RSA Encryption Standards,” in Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020, Dec. 2020, pp. 333–338. doi: 10.1109/SMART50582.2020.9336800.
D. Sow, L. Robert, and P. Lafourcade, “Linear Generalized ElGamal Encryption Scheme,” Cryptology ePrint Archive, 2020.
A. K. Koundinya and G. SK, “Two-Layer Encryption based on Paillier and ElGamal Cryptosystem for Privacy Violation,” International Journal of Wireless and Microwave Technologies, vol. 11, no. 3, pp. 9–15, Jun. 2021, doi: 10.5815/ijwmt.2021.03.02.
O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. Al-Din Abed, and A. T. Hammid, “Implementation of El-Gamal algorithm for speech signals encryption and decryption,” in Procedia Computer Science, 2020, vol. 167, pp. 1028–1037. doi: 10.1016/j.procs.2020.03.402.
W. Susilo, J. Tonien, and G. Yang, “Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA,” Comput Stand Interfaces, vol. 74, Feb. 2021, doi: 10.1016/j.csi.2020.103470.
S. F. Yousif, A. J. Abboud, and H. Y. Radhi, “Robust Image Encryption with Scanning Technology, the El-Gamal Algorithm and Chaos Theory,” IEEE Access, vol. 8, pp. 155184–155209, 2020, doi: 10.1109/ACCESS.2020.3019216.
DOI: http://dx.doi.org/10.30645/jurasik.v8i1.545
DOI (PDF): http://dx.doi.org/10.30645/jurasik.v8i1.545.g523
Refbacks
- There are currently no refbacks.
JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika)
Published Papers Indexed/Abstracted By: