p-Index From 2021 - 2026
6.875
P-Index
This Author published in this journals
All Journal InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan Sinkron : Jurnal dan Penelitian Teknik Informatika JurTI (JURNAL TEKNOLOGI INFORMASI) Zero : Jurnal Sains, Matematika, dan Terapan IJISTECH (International Journal Of Information System & Technology) Jurdimas (Jurnal Pengabdian Kepada Masyarakat) Royal JOURNAL OF SCIENCE AND SOCIAL RESEARCH JURSIMA (Jurnal Sistem Informasi dan Manajemen) REMIK : Riset dan E-Jurnal Manajemen Informatika Komputer INFOKUM Community Development Journal: Jurnal Pengabdian Masyarakat Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE) LEGAL BRIEF Journal of Computer Networks, Architecture and High Performance Computing IJISTECH Yayasan Cita Cendikiawan Al Khwarizmi Proceeding International Seminar of Islamic Studies Jurnal Minfo Polgan (JMP) sudo Jurnal Teknik Informatika Hello World Factory Jurnal Industri, Manajemen dan Rekayasa Sistem Industri Jurnal Pemberdayaan Sosial dan Teknologi Masyarakat JURSIMA Journal of Innovation in Research, Education and Culture (JIREC) Jurnal Sistem Informasi dan Manajemen Jurnal Pengabdian Masyarakat dan Riset Pendidikan Jurnal Intelek Dan Cendikiawan Nusantara Jurnal Intelek Insan Cendikia Applied Information Technology and Computer Science (AICOMS) Portal Riset dan Inovasi Sistem Perangkat Lunak Al'Adzkiya International of Computer Science and Information Technology Journal Jurnal Pengabdian dan Inovasi Masyarakat
Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : JurTI (JURNAL TEKNOLOGI INFORMASI)

Penerapan Kriptografi RSA Dalam Mengamankan File Teks Berbasis PHP Dicky Apdilah; Heru Swanda
(JurTI) Jurnal Teknologi Informasi Vol 2, No 1 (2018): JUNI 2018
Publisher : Universitas Asahan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (796.049 KB) | DOI: 10.36294/jurti.v2i1.407

Abstract

Abstract - Along with the development of communication technology human needs in the use of technology are increasing, especially in data storage. One way to improve security for data is by using cryptographic methods. RSA Algorithm (Rivest Shamir Adleman) is one method in the branch of cryptography, where RSA is a type of asymmetric cryptography that uses 2 keys, namely public and private keys. The problem of increasing the security of the public key and private key in RSA (Rivest Shamir Adlema) is that the Linear Congruential Generator (LCG) method is needed, LCG is used to generate a set of random numbers to n, where a set of random numbers will be taken that have a number value prime. One method for generating prime numbers is The Sieve Of Eratosthenes algorithm, The Sieve Of Eratosthenes algorithm is a classic algorithm for determining all prime numbers until the n-number is specified. The way the The Sieve Of Eratosthenes method works is to eliminate numbers that are not prime numbers, resulting in a collection of prime numbers. The prime number generated by the The Sieve Of Eratosthenes algorithm will be used for the public key and private key in the RSA criterion. Keywords - RSA, LCG, The Sieve of Eratosthenes.