KOMBINASI ALGORITMA ENKRIPSI DAN DEKRIPSI MENGGUNAKAN CAESAR CIPHER, DATA ENCRYPTION STANDARD, DAN RIVEST SHAMIR ADLEMAN UNTUK MENDAPATKAN ALGORITMA BARU DENGAN KEAMANAN YANG LEBIH TINGGI

FAKHRIANSYAH, MUHAMMAD NUR and Cahyono, Endro Setyo and Suprihatin, Bambang (2023) KOMBINASI ALGORITMA ENKRIPSI DAN DEKRIPSI MENGGUNAKAN CAESAR CIPHER, DATA ENCRYPTION STANDARD, DAN RIVEST SHAMIR ADLEMAN UNTUK MENDAPATKAN ALGORITMA BARU DENGAN KEAMANAN YANG LEBIH TINGGI. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_44201_08011281924050.pdf] Text
RAMA_44201_08011281924050.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_44201_08011281924050_TURNITIN.pdf] Text
RAMA_44201_08011281924050_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (4MB) | Request a copy
[thumbnail of RAMA_44201_08011281924050_0026096401_0026017102_01_front_ref.pdf] Text
RAMA_44201_08011281924050_0026096401_0026017102_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (750kB)
[thumbnail of RAMA_44201_08011281924050_0026096401_0026017102_02.pdf] Text
RAMA_44201_08011281924050_0026096401_0026017102_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (352kB) | Request a copy
[thumbnail of RAMA_44201_08011281924050_0026096401_0026017102_03.pdf] Text
RAMA_44201_08011281924050_0026096401_0026017102_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (138kB) | Request a copy
[thumbnail of RAMA_44201_08011281924050_0026096401_0026017102_04.pdf] Text
RAMA_44201_08011281924050_0026096401_0026017102_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (284kB) | Request a copy
[thumbnail of RAMA_44201_08011281924050_0026096401_0026017102_05.pdf] Text
RAMA_44201_08011281924050_0026096401_0026017102_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (4kB) | Request a copy
[thumbnail of RAMA_44201_08011281924050_0026096401_0026017102_06_ref.pdf] Text
RAMA_44201_08011281924050_0026096401_0026017102_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (141kB) | Request a copy
[thumbnail of RAMA_44201_08011281924050_0026096401_0026017102_07_lamp.pdf] Text
RAMA_44201_08011281924050_0026096401_0026017102_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (78kB) | Request a copy

Abstract

Two basic techniques in cryptography are symmetric and asymmetric. Algorithm Caesar Cipher and Data Encryption Standard includes a symmetric algorithm, while the RSA algorithm includes an asymmetric algorithm. Algorithm hybrid which combines symmetric and asymmetric algorithms is formed to get the advantages of each algorithm. In the encryption and decryption process, high security is the basic benchmark. High data security can be measured by several parameters such as encryption and decryption speed, CPU usage and memory usage. In this study use a combination of algorithms with encryption that starts with the algorithm Caesar Cipher, Data Encryption Standard, and RSA and substantiated by decryption starting with the RSA algorithm, Data Encryption Standard, and Caesar Cipher. This study compare data security with a comparison of a combination of algorithms and a single algorithm. By combining the Caesar Cipher algorithm, Data Encryption Standard, and RSA you can save time, CPU and memory usage. In the combination of algorithms when encryption takes 7.9 seconds, CPU usage is 27.4%, memory used is 8533 mb and when encryption takes 8.4 seconds, CPU usage is 27.8%, memory used is 8527 mb .

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: ALGORITMA ENKRIPSI DAN DEKRIPSI
Subjects: Q Science > QA Mathematics > QA8.9-QA10.3 Computer science. Artificial intelligence. Computational complexity. Data structures (Computer scienc. Mathematical Logic and Formal Languages
Divisions: 08-Faculty of Mathematics and Natural Science > 44201-Mathematics (S1)
Depositing User: Muhammad Nur Fakhriansyah
Date Deposited: 11 Aug 2023 02:49
Last Modified: 11 Aug 2023 02:49
URI: http://repository.unsri.ac.id/id/eprint/126646

Actions (login required)

View Item View Item