“…Pemfaktoran dilakukan untuk memperoleh kunci privat (Sumarno et al, 2018). Algoritma RSA memiliki 3 proses penting: key generation, encryption, dan decryption (Aufa, Endroyono, & Affandi, 2018).…”
Section: Survei Literaturunclassified
“…Menurut Mitali and Sharma bahwa kelemahan utama dari algoritma RSA adalah pemrosesan yang lambat. Metode kombinasi RSA 1024 dan DSA 512 untuk mendapatkan waktu komputasi yang relatif cepat (Aufa et al, 2018). Metode kombinasi ini tidak hanya dapat mengenkripsi pesan, tetapi juga menyediakan tanda tangan digital untuk proses otentikasi dengan aman dan cepat (Aufa et al, 2018).…”
Section: Perkembangan Kriptografi Asimetrisunclassified
AbstrakKeamanan merupakan salah satu faktor penting dalam penyimpanan dan pengiriman data atau pesan. Salah satu cara untuk mengamankan dokumen adalah dengan menggunakan algoritma kriptografi. Kriptografi berdasarkan jenis kuncinya dibedakan menjadi dua yaitu kriptografi simetris dan asimetris. Algoritma enkripsi asimetris termasuk Rivest-Shamir-Adleman (RSA), Diffie-Hellman, Digital Secure Algorithm (DSA), XTR, Elliptic Curve Cryptography (ECC), dan Elgamal Encryption System (ESS). Dalam makalah ini akan melakukan survei paper terkait algoritma-algoritma enkripsi asimetris. Implementasi kriptografi asimetris dapat dikembangkan menggunakan algoritma-algoritma tersebut.
“…Pemfaktoran dilakukan untuk memperoleh kunci privat (Sumarno et al, 2018). Algoritma RSA memiliki 3 proses penting: key generation, encryption, dan decryption (Aufa, Endroyono, & Affandi, 2018).…”
Section: Survei Literaturunclassified
“…Menurut Mitali and Sharma bahwa kelemahan utama dari algoritma RSA adalah pemrosesan yang lambat. Metode kombinasi RSA 1024 dan DSA 512 untuk mendapatkan waktu komputasi yang relatif cepat (Aufa et al, 2018). Metode kombinasi ini tidak hanya dapat mengenkripsi pesan, tetapi juga menyediakan tanda tangan digital untuk proses otentikasi dengan aman dan cepat (Aufa et al, 2018).…”
Section: Perkembangan Kriptografi Asimetrisunclassified
AbstrakKeamanan merupakan salah satu faktor penting dalam penyimpanan dan pengiriman data atau pesan. Salah satu cara untuk mengamankan dokumen adalah dengan menggunakan algoritma kriptografi. Kriptografi berdasarkan jenis kuncinya dibedakan menjadi dua yaitu kriptografi simetris dan asimetris. Algoritma enkripsi asimetris termasuk Rivest-Shamir-Adleman (RSA), Diffie-Hellman, Digital Secure Algorithm (DSA), XTR, Elliptic Curve Cryptography (ECC), dan Elgamal Encryption System (ESS). Dalam makalah ini akan melakukan survei paper terkait algoritma-algoritma enkripsi asimetris. Implementasi kriptografi asimetris dapat dikembangkan menggunakan algoritma-algoritma tersebut.
“…Cryptography is the science of hidden writing which is encryption and decryption text and messages. [2] Cryptography divided into two significant operations: encryption and decryption. The encryption process is the converting of plain text (original message) into ciphertext (hidden message) that can't be read by an authorized user [1,3].…”
Section: Literature Studymentioning
confidence: 99%
“…On other hands the public key and private key used in the asymmetric. symmetric key defined as public-key cryptography [2]. The Asymmetric keys utilize pair of keys the first is a hidden key while the second one is a public key.…”
One of the common problems of sharing resources over a data communication network is security. Generally sharing information's and resources over a network between a huge number of users is important especially in computer science and engineering field, and this becomes a critical problem for data security. Nowadays many algorithms used for encryption and decryption of data. Cryptography algorithms are divided into symmetric and asymmetric algorithms based on the key used between the sender and receiver of the pieces of information. this paper provides a comparison between symmetric and asymmetric algorithms by using two common algorithms such as AES and RSA. The comparison process focused on the execution time for encrypting and decrypting message of various word length.
“…Besides, this algorithm is also used for the signature. To create the signing, we apply the private key while we use the public key to verify the authenticity of the signing to ensure the message's integrity [20]. d) Advanced encryption standard (AES) with secure hash function (SHA) AES is a block cipher standard published by the National Institute of Standard and Technology (NIST) and has become one of the most popular symmetric encryption algorithms [21].…”
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.