IMPLEMENTASI ALGORITMA RSA UNTUK PENGAMANAN TRANSMISI DATA PADA JARINGAN WIRELESS INTRANET 2020

YEREMIA, CHRISTOFER and Mulya, Megah and Marieska, Mastura Diana (2020) IMPLEMENTASI ALGORITMA RSA UNTUK PENGAMANAN TRANSMISI DATA PADA JARINGAN WIRELESS INTRANET 2020. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_55201_09021181621024.pdf] Text
RAMA_55201_09021181621024.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (7MB) | Request a copy
[thumbnail of RAMA_55201_09021181621024_TURNITIN.pdf] Text
RAMA_55201_09021181621024_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (7MB) | Request a copy
[thumbnail of RAMA_55201_09021181621024_0020026609_0021038607_01_front_ref.pdf]
Preview
Text
RAMA_55201_09021181621024_0020026609_0021038607_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (904kB) | Preview
[thumbnail of RAMA_55201_09021181621024_0020026609_0021038607_02.pdf] Text
RAMA_55201_09021181621024_0020026609_0021038607_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (719kB) | Request a copy
[thumbnail of RAMA_55201_09021181621024_0020026609_0021038607_03.pdf] Text
RAMA_55201_09021181621024_0020026609_0021038607_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_55201_09021181621024_0020026609_0021038607_04.pdf] Text
RAMA_55201_09021181621024_0020026609_0021038607_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (5MB) | Request a copy
[thumbnail of RAMA_55201_09021181621024_0020026609_0021038607_05.pdf] Text
RAMA_55201_09021181621024_0020026609_0021038607_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (607kB) | Request a copy
[thumbnail of RAMA_55201_09021181621024_0020026609_0021038607_06.pdf] Text
RAMA_55201_09021181621024_0020026609_0021038607_06.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (292kB) | Request a copy
[thumbnail of RAMA_55201_09021181621024_0020026609_0021038607_06_ref.pdf] Text
RAMA_55201_09021181621024_0020026609_0021038607_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (393kB) | Request a copy
[thumbnail of RAMA_55201_09021181621024_0020026609_0021038607_07_lamp.pdf] Text
RAMA_55201_09021181621024_0020026609_0021038607_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (583kB) | Request a copy

Abstract

Securing data that will be transmitted on a wireless network is important. It is because many unauthorized parties can steal the data from the network. Therefore a strong method needed to secure the transmitted data so it cannot be read. One of the data security technique is asymmetric cryptography, where the encryption key and the decryption key are different. In this research, the asymmetry algorithm used is the RSA algorithm. The RSA algorithm is known to have a robust level of security, this is due to the difficulty of factoring large prime numbers. The data that will be secured using the RSA algorithm in this study is a string data type. The data encryption process is executed before the data transmitted into a wireless network. The decryption process is executed when the data has been received. Based on the results of tests that have been done, it is known that the speed of the RSA algorithm in performing encryption and decryption is influenced by the size of the public and private keys. After several experiments using public keys (16381, 11663) and private keys (3061, 11663) in securing 1152-bits data, the encryption time is 19,043 ms and the decryption time is 10.451 ms. The encryption time is greater than the decryption time because the public key is greater than the private key, so the encryption time is slightly longer than the decryption time. Keywords : Cryptography, RSA (R'ivest - S'hamir - A’dleman), wireless

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Cryptography, RSA (R'ivest - S'hamir - A’dleman), wireless
Subjects: Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
T Technology > T Technology (General) > T1-995 Technology (General)
Divisions: 09-Faculty of Computer Science > 55201-Informatics (S1)
Depositing User: Users 6321 not found.
Date Deposited: 07 Jul 2020 03:12
Last Modified: 07 Jul 2020 03:12
URI: http://repository.unsri.ac.id/id/eprint/31087

Actions (login required)

View Item View Item