Perbandingan Performa dari Algoritma AES dan RSA dalam Keamanan Transaksi

Ahmad Miftah Fajrin(1*), Christoper Kelvin(2), Brian Owen(3), Bayu Aji(4),

(1) Universitas Surabaya, Indonesia
(2) Universitas Surabaya, Indonesia
(3) Universitas Surabaya, Indonesia
(4) Universitas Surabaya, Indonesia
(*) Corresponding Author

Abstract


Online transactions have become increasingly prevalent in the modern day. It is highly user-friendly and can be conveniently transported to any location. Nevertheless, internet transactions possess inherent security vulnerabilities that render them susceptible to assaults, hence enabling the retrieval of consumers' personal data. Hence, it is imperative to use encryption measures for safeguarding users' personal data, including PINs, CVVs, and card numbers. This study aims to evaluate and contrast the efficacy of AES and RSA algorithms within a website platform designed for online transactions. The study's findings indicate that there is minimal disparity in the performance of the two algorithms. However, it was observed that both algorithms exhibit enhanced security when employing longer keys.

Full Text:

PDF

References


Li, Y., & Liu, Q. (2021). A Comprehensive Review Study Of Cyber-Attacks And Cyber Security; Emerging Trends And Recent Developments. Energy Reports, 7, 8176–8186. Https://Doi.Org/10.1016/J.Egyr.2021.08.126

Aziz, N., Rodiah, R., & Susanto, H. (2021). Encrypting Of Digital Banking Transaction Records: An Blockchain Cryptography Security Approach. International Journal Of Computer Applications, 174(24), 21–26. Https://Doi.Org/10.5120/Ijca2021921147

Sihotang, H. T., Efendi, S., Zamzami, E. M., & Mawengkang, H. (2020). Design And Implementation Of Rivest Shamir Adleman’s (Rsa) Cryptography Algorithm In Text File Data Security. Journal Of Physics: Conference Series, 1641(1). Https://Doi.Org/10.1088/1742-6596/1641/1/012042

Galih, M., & Ramadhan, R. (2021). Theoretical Mathematics , The Creation Of The Rsa Algorithm , And Breaking It Using Algorithms Based On The Same Idea.

Muttaqin, K., & Rahmadoni, J. (2020). Analysis And Design Of File Security System Aes (Advanced Encryption Standard) Cryptography Based. Journal Of Applied Engineering And Technological Science, 1(2), 113–123. Https://Doi.Org/10.37385/Jaets.V1i2.78

Guy-Cedric, T. B. I., & R., S. (2018). A Comparative Study On Aes 128 Bit And Aes 256 Bit. International Journal Of Scientific Research In Computer Science And Engineering, 6(4), 30–33. Https://Doi.Org/10.26438/Ijsrcse/V6i4.3033

Ramadhan, P. S., Syahril, M., Kustini, R., Winata, H., & Gea, R. D. (2023). Pengamanan Data Transaksi Menggunakan Aes Dan Rc4. Journal Of Computer Engineering, System, And Science.

Hidayat, M. ., Tahir, M. ., Sukriyadi , A. ., Sulton , A., A, C. A. S., & F, . S. A. . Penerapan Kriptografi Caesar Chiper Dalam Pengamanan Data. Jurnal Ilmiah Multidisiplin, 2(03). Https://Doi.Org/10.56127/Jukim.V2i03.619

Barakat, M., Eder, C., & Hanke, T. (2018). An Introduction To Cryptography.

Kumar, P., & Rana, S. B. (2015). Development Of Modified Aes Algorithm For Data Security. Optik 127. Https://Doi.Org/10.1016/J.Ijleo.2015.11.188.

M. Shand And J. Vuillemin, "Fast Implementations Of Rsa Cryptography," Proceedings Of Ieee 11th Symposium On Computer Arithmetic, Windsor, On, Canada, 1993, Pp. 252-259, Doi: 10.1109/Arith.1993.378085.

Milanov, E. (2009). The Rsa Algorithm.




DOI: https://doi.org/10.30645/kesatria.v5i2.379

DOI (PDF): https://doi.org/10.30645/kesatria.v5i2.379.g376

Refbacks

  • There are currently no refbacks.


Published Papers Indexed/Abstracted By: