Abstract:Lack of security measures for cybersecurity threat is somewhat vulnerable and can even put one’s digital life at high risk of phishing attack which is so alarming nowadays. Perpetrators may even use fictitious personal information to infiltrate various institutions for their malicious acts. It is the aim of this paper to present a security measure for a safe data transfer by means of vaccination card. Vaccination information is one of the most commonly acquired pieces of data today. However, because most inter… Show more
“…Dalam algoritma RSA ada standar proses enkripsi yang disebut PKCS (Public Key Cryptography Standard), pada umumnya digunakan untuk mengaitentikasi pesan biner terenskripsi, dan didekripsi oleh penerima pesan [16]. Jika hanya menggunakan kode ASCII dalam mengkonversi teks, program akan mudah ditebak.…”
Section: Membangkitkan Kunci Dengan Menggunakan Persamaanunclassified
Cryptography can be used in prevent data, one of the preventive measures is by encoding messages. Cryptography is the study of encoding messages or ways of data protection. In encoding the content of messages, there is an algorithm conventionally used nowadays, the RSA (Rivest-Shamir-Adleman) algorithm. The RSA algorithm is a method that has two different keys for each encryption and decryption process but is still interrelated to maintain security in processing the data. In finding the key, the RSA algorithm utilizes the rule of prime number. The larger the prime number used as a key, the harder it is to find a large number as a factor. This research describes the process of encrypting text messages, the content of documents using the RSA algorithm, and the key generation process. Those processes are done by converting plaintext into ciphertext using ASCII code, which is 256 long, and using PKCS (Public Key Cryptography Standards) is the encryption process on the RSA algorithm. This study uses Pyhton programming language to implement the RSA algorithm on text messages and documents. As a recommendation to the subsequent studies, it is proper to use algorithms or other programming languages to secure messages.
“…Dalam algoritma RSA ada standar proses enkripsi yang disebut PKCS (Public Key Cryptography Standard), pada umumnya digunakan untuk mengaitentikasi pesan biner terenskripsi, dan didekripsi oleh penerima pesan [16]. Jika hanya menggunakan kode ASCII dalam mengkonversi teks, program akan mudah ditebak.…”
Section: Membangkitkan Kunci Dengan Menggunakan Persamaanunclassified
Cryptography can be used in prevent data, one of the preventive measures is by encoding messages. Cryptography is the study of encoding messages or ways of data protection. In encoding the content of messages, there is an algorithm conventionally used nowadays, the RSA (Rivest-Shamir-Adleman) algorithm. The RSA algorithm is a method that has two different keys for each encryption and decryption process but is still interrelated to maintain security in processing the data. In finding the key, the RSA algorithm utilizes the rule of prime number. The larger the prime number used as a key, the harder it is to find a large number as a factor. This research describes the process of encrypting text messages, the content of documents using the RSA algorithm, and the key generation process. Those processes are done by converting plaintext into ciphertext using ASCII code, which is 256 long, and using PKCS (Public Key Cryptography Standards) is the encryption process on the RSA algorithm. This study uses Pyhton programming language to implement the RSA algorithm on text messages and documents. As a recommendation to the subsequent studies, it is proper to use algorithms or other programming languages to secure messages.
“…RSA is well-suited for ticket generation and validation because it provides a way to encrypt securely and decrypt data. RSA [8] can ensure the tickets are tamper-proof and cannot be modified or duplicated. However, RSA can be computationally expensive, especially for large key sizes.…”
Section: Comparison Of Different Cryptographic Techniques For Ticket ...mentioning
The motivation for this research arises from the challenges faced by railway operators in managing ticketing processes effectively. These challenges highlight the need for a robust web-based application to automate ticket verification and validation, emphasizing the importance of developing a secure and efficient ticket generation and validation system. The proposed solution employs RSA (Rivest-Shamir-Adleman) and Keccak cryptographic algorithms to ensure the security and efficiency of ticket generation and validation. By generating digital signatures and hash functions, the authenticity and integrity of ticket data are maintained. Recipients can utilize the sender's public key and the same hash function to verify the ticket data's authenticity. The system offers several advantages, including security, integrity, authentication, efficiency, and scalability. Future work may involve implementing multi-party computation, developing more efficient algorithms, exploring blockchain technology, and conducting more extensive testing and evaluation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.