FAKHRIANSYAH, MUHAMMAD NUR and Cahyono, Endro Setyo and Suprihatin, Bambang (2023) KOMBINASI ALGORITMA ENKRIPSI DAN DEKRIPSI MENGGUNAKAN CAESAR CIPHER, DATA ENCRYPTION STANDARD, DAN RIVEST SHAMIR ADLEMAN UNTUK MENDAPATKAN ALGORITMA BARU DENGAN KEAMANAN YANG LEBIH TINGGI. Undergraduate thesis, Sriwijaya University.
Text
RAMA_44201_08011281924050.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
|
Text
RAMA_44201_08011281924050_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (4MB) | Request a copy |
|
Text
RAMA_44201_08011281924050_0026096401_0026017102_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (750kB) |
|
Text
RAMA_44201_08011281924050_0026096401_0026017102_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (352kB) | Request a copy |
|
Text
RAMA_44201_08011281924050_0026096401_0026017102_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (138kB) | Request a copy |
|
Text
RAMA_44201_08011281924050_0026096401_0026017102_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (284kB) | Request a copy |
|
Text
RAMA_44201_08011281924050_0026096401_0026017102_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (4kB) | Request a copy |
|
Text
RAMA_44201_08011281924050_0026096401_0026017102_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (141kB) | Request a copy |
|
Text
RAMA_44201_08011281924050_0026096401_0026017102_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (78kB) | Request a copy |
Abstract
Two basic techniques in cryptography are symmetric and asymmetric. Algorithm Caesar Cipher and Data Encryption Standard includes a symmetric algorithm, while the RSA algorithm includes an asymmetric algorithm. Algorithm hybrid which combines symmetric and asymmetric algorithms is formed to get the advantages of each algorithm. In the encryption and decryption process, high security is the basic benchmark. High data security can be measured by several parameters such as encryption and decryption speed, CPU usage and memory usage. In this study use a combination of algorithms with encryption that starts with the algorithm Caesar Cipher, Data Encryption Standard, and RSA and substantiated by decryption starting with the RSA algorithm, Data Encryption Standard, and Caesar Cipher. This study compare data security with a comparison of a combination of algorithms and a single algorithm. By combining the Caesar Cipher algorithm, Data Encryption Standard, and RSA you can save time, CPU and memory usage. In the combination of algorithms when encryption takes 7.9 seconds, CPU usage is 27.4%, memory used is 8533 mb and when encryption takes 8.4 seconds, CPU usage is 27.8%, memory used is 8527 mb .
Item Type: | Thesis (Undergraduate) |
---|---|
Uncontrolled Keywords: | ALGORITMA ENKRIPSI DAN DEKRIPSI |
Subjects: | Q Science > QA Mathematics > QA8.9-QA10.3 Computer science. Artificial intelligence. Computational complexity. Data structures (Computer scienc. Mathematical Logic and Formal Languages |
Divisions: | 08-Faculty of Mathematics and Natural Science > 44201-Mathematics (S1) |
Depositing User: | Muhammad Nur Fakhriansyah |
Date Deposited: | 11 Aug 2023 02:49 |
Last Modified: | 11 Aug 2023 02:49 |
URI: | http://repository.unsri.ac.id/id/eprint/126646 |
Actions (login required)
View Item |