CFP last date
01 May 2024
Reseach Article

Document Office Safety Application using Asimetric Cryptography Algorithm RSA

by Susanto
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 17
Year of Publication: 2018
Authors: Susanto
10.5120/cae2018652770

Susanto . Document Office Safety Application using Asimetric Cryptography Algorithm RSA. Communications on Applied Electronics. 7, 17 ( Jun 2018), 1-6. DOI=10.5120/cae2018652770

@article{ 10.5120/cae2018652770,
author = { Susanto },
title = { Document Office Safety Application using Asimetric Cryptography Algorithm RSA },
journal = { Communications on Applied Electronics },
issue_date = { Jun 2018 },
volume = { 7 },
number = { 17 },
month = { Jun },
year = { 2018 },
issn = { 2394-4714 },
pages = { 1-6 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume7/number17/816-2018652770/ },
doi = { 10.5120/cae2018652770 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T20:03:40.033874+05:30
%A Susanto
%T Document Office Safety Application using Asimetric Cryptography Algorithm RSA
%J Communications on Applied Electronics
%@ 2394-4714
%V 7
%N 17
%P 1-6
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Document has an important role in the efficiency of time and work. Document is a media of information storage such as text, images, or graphics. The security aspect of important documents is necessary, unfortunately this aspect is usually ignored, even excluded. This case can cause serious problems and could be harmful to the owner of the document. This study aims to perform document security by using Asymmetric Cryptography Algorithm RSA (Rivest Shamir Adleman). The design of document security application is using Asymmetric Cryptography Algorithm RSA (Rivest Shamir Adleman). The process of securing documents was done with two types of keys: public keys and private keys that both locks can be set up to 1024 bits or more. The system was built by using Microsoft Visual C# 2010 software. The tests were conducted on thirty-six document samples. The result which can be obtained from this study indicates that the application of securing office document by using Asymmetric Cryptography RSA ( Rivest Shamir Adleman) algorithm with key length 1024 Bit succeeded in performing keyword generation function by changing the form of number and irregularly arranged random symbols and samples of encrypted documents in the text file format (*.txt).

References
  1. Ariyus, D. 2008. Pengantar Ilmu Kriptografi: Teori, Analisis, dan Implementasi, Andi, Yogyakarta.
  2. Arief, M. 2015. Kriptografi RSA Pada Aplikasi File Transfer Client-Server Based, Jurnal, Universitas Telkom, Bandung .
  3. Ayushi, 2010, A Symetric Key Cryptographic Algoritm, International Journal of Computer Application, (0975-8887), Volume 1 – No. 15.
  4. Rahman, MM., Akter T., Rahman A., 2016, Development of Cryptiography-Based Secure Messaging System, Journal of Telecommunication System & Management, DOI: 10.4172/2167-0919.1000142.
  5. Refialy, L. 2015. Pengaman Sertifikat Tanah Digital Menggunakan Digital Signature SHA-512 dan RSA, Jurnal, Salatiga : Universitas Kristen SatyaWacana
  6. Wibowo I. 2009. Penerapan Algoritma Kriptografi Asimetris RSA Untuk Keamanan Data Di Oracle, Jurnal, Yogyakarta : Universitas Kristen Duta Wacana.
  7. Kromodimoeljo, S. 2009. Ebook Teori dan Aplikasi KriptografI, Indonesia : SPK IT.
  8. Qiong Huang, Duncan S. Wong. 2008. On the relation among various security models for certificateless cryptography. Int. J. of Applied Cryptography.Vol. 1. No.2.
  9. Sanchita Paul, Tausif Anwar, Abhishek Kumar. 2016. An innovative DNA cryptography technique for secure data transmission. Int. J. of Bioinformatics Research and Applications. Vol. 12. No.3.
  10. Prakash Kuppuswamy, Saeed Q.Y. Al-Khalidi. 2014. Hybrid encryption/decryption technique using new public key and symmetric key algorithm. Int. J. of Information and Computer Security 2014.Vol. 6. No.4.
Index Terms

Computer Science
Information Sciences

Keywords

Application Cryptography Document RSA (Rivest Shamir Adleman)