Implementasi Algoritma Rivest Shamir Adleman (RSA) Multiprima dan Chinese Remainder Theorem (CRT) pada Pengamanan Pesan Teks

Adhi Yoga Pratama, Hendro Wijayanto

Abstract


RSA (Rivest-Shamir-Adleman) adalah algoritma kriptografi kunci public yang popular dalam implementasinya. Sulitnya memfaktorkan bilangan besar menjadi factor-faktor prima adalah dasar keamanan algoritma RSA. Tahap awal RSA adalah memilih bilangan prima acak p dan q, untuk selanjutnya dihitung modulus n. Besarnya nilai modulus n berbanding lurus dengan tingkat keamanan dan tingginya waktu performansi algoritma. Dalam aspek keamanan, untuk memperoleh nilai modulus n yang besar maka diimplementasikan RSA Multiprima dengan tiga bilangan prima acak (p, q, dan r) dalam pembangkitan kunci. Menangani efisiensi waktu proses dekripsi, memanfaatkan Chinese Remainder Theorem (CRT) untuk menghitung kunci privat dalam beberapa modul terpisah, sehingga dapat mempercepat  kalkulasi dalam proses dekripsi. Hasil dari kajian ini menunjukan bahwa implementasi CRT pada RSA Multiprima dapat mempercepat proses dekripsi, sehingga dapat menjadi solusi efisiensi sumber daya dalam implementasi algoritma kriptografi RSA Multiprima. Dalam kajian ini, implementasi menggunakan Bahasa pemrograman Python dengan versi 3.12.2. Kajian ini diharapkan dapat memberikan manfaat dalam pengembangan kriptografi modern yang lebih efisien.

Keywords


RSA; Chinese Remainder Theorem (CRT); Kriptografi; Python

References


Ni Komang Novia Widiasari and Emmy Febriani Thalib, “The Impact of Information Technology Development on Cybercrime Rate in Indonesia,” Journal of Digital Law and Policy, vol. 1, no. 2, pp. 73–86, Jan. 2022, doi: 10.58982/jdlp.v1i2.165.

Shuaib Ahmed Wadho, Areej Fatemah Meghji, Aun Yichiet, Roshan Kumar, and Farhan Bashir Shaikh, “Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review,” VAWKUM Transactions on Computer Sciences, vol. 11, no. 1, pp. 295–305, Jun. 2023, doi: 10.21015/vtcs.v11i1.1521.

Annisa Desianty and Imelda Imelda, “Systematic Literature Review: Cybersecurity by Utilizing Cryptography Using the Data Encryption Standard (DES) Algorithm,” Jurnal Teknik Informatika, vol. 17, no. 1, pp. 30–39, Apr. 2024, doi: 10.15408/jti.v17i1.37256.

Amosa Babalola, Ekuewa Bamidele, Olatunbosun Esther, and Oyetunji Olumayowa, “Cryptography: A Review,” International Journal of Advances in Engineering and Management (IJAEM), vol. 3, no. 10, pp. 1385–1391, Oct. 2021, doi: 10.35629/5252-031013851391.

Agus Triono, Apri Setia Budi, Rafi Abdillah, and Wahyudi, “IMPLEMENTASI PERETASAN SANDI VIGENERE CHIPHER MENGGUNAKAN BAHASA PEMROGRAMAN PYTHON,” JOCITIS-Journal Science Infomatica and Robotics, vol. 1, no. 1, pp. 1–9, Sep. 2023.

Muhammad Zaky Zachary, Sisilia Sylviani, and Edi Kurniadi, “Implementasi Algoritma RSA (Rivest-Shamir-Adleman) pada Kriptografi Klasik,” Mathematical Sciences and Applications Journal, vol. 4, no. 2, pp. 54–59, Apr. 2024, doi: 10.22437/msa.v4i2.28863.

Padmapriya V, Thanigaivelan A, Harish J, and Surya G, “Enhanced Integer Factor Optimization in RSA Cryptography using Shor Quantum,” International Journal of Research Publication and Reviews, vol. 5, no. 5, pp. 2009–2016, May 2024, doi: 10.55248/gengpi.

Aayush Shah, Prabhat Mahato, and Aadarsh Bhagat, “Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm,” International Journal for Research in Applied Science & Engineering Technology (IJRASET), vol. 11, no. VIII, pp. 1626–1642, Aug. 2023, doi: 10.22214/ijraset.2023.55341.

Tigus Juni Betri, Haya Nur Fadilah, and Galih Fajar Nugroho, “Data Science Analysis on UIN Raden Mas Said’s Media Accounts,” International Journal of Science and Applied Science: Conference Series, vol. 8, no. 1, pp. 76–85, 2024, doi: 10.20961/ijsascs.v7i2.96733.

Vineesh Cutting and Nehemiah Stephen, “A Review on using Python as a Preferred Programming Language for Beginners,” International Research Journal of Engineering and Technology (IRJET), vol. 8, no. 8, pp. 4258–4263, Aug. 2021.

Anahita Ghanad, “An Overview of Quantitative Research Methods,” INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY RESEARCH AND ANALYSIS, vol. 6, no. 8, pp. 3794–3803, Aug. 2023, doi: 10.47191/ijmra/v6-i8-52.

Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, and Mohammad Andri Budiman, “COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS,” Jurnal Teknologi (Sciences & Engineering), vol. 86, no. 4, pp. 181–190, 2024, doi: 10.11113/jurnalteknologi.v86.20723.

Shovan Mondal and Aji Primajaya, “THE IMPLEMENTATION OF RSA ALGORITHM IN TEXT MESSAGES ENCRYPTION AND DECRYPTION,” JATI (Jurnal Mahasiswa Teknik Informatika), vol. 8, no. 6, pp. 12620–12624, Dec. 2024, doi: 10.36040/jati.v8i6.12037.

Muhammad Arief Budiman, Edi Kurniadi, Sukono, and Sisilia Sylviani, “Metode Pemecahan Sistem Kongruensi Linear,” Mathematical Sciences and Applications Journal, vol. 5, no. 1, pp. 27–33, 2024, doi: 10.22437/msa.v5i1.38085.

Elvis Adam Alhassan et al., “On Some Algebraic Properties of the Chinese Remainder Theorem with Applications to Real Life,” Journal of Applied Mathematics and Computation, vol. 5, no. 3, pp. 219–224, 2021, doi: 10.26855/jamc.2021.09.008.

Panyawat Haarsa, “Solving Bernoulli’s Equations Using Python: Enhancing Student Understanding Through Inquiry-Based Learning,” Unnes Journal of Mathematics Education, vol. 13, no. 3, pp. 210–219, 2024, doi: 10.15294/ujme.v13i3.

Triloka Mahesti, Arum Febriyanti Ciptaningtyas, and Agni Astungkara, “Perbandingan Penggunaan Algoritma Kriptografi DES, RSA, Modifikasi DES dan Modifikasi RSA untuk Penyandian Database,” Jurnal Ilmiah ILKOMINFO - Ilmu Komputer & Informatika, vol. 8, no. 1, pp. 1–15, 2025, doi: 10.47324/ilkominfo.v8i1.294.

Divya and Upasna Setia, “Evaluating RSA Key Length: Impact on Security Hardness and Computational Efficiency,” Journal Publication of International Research for Engineering and Management (JOIREM), vol. 10, no. 8, pp. 1–6, Aug. 2024.

Asep Rizal Nurjaman, “PENANDA TANGANAN DOKUMEN DIGITAL PADA SISTEM PENYIMPANAN FILE MENGGUNAKAN KOMBINASI ALGORITMA SHA3-512 DAN RSA UNTUK MEMPERTAHANKAN KEASLIAN DATA DOKUMEN,” JITTER (Jurnal Ilmiah Teknologi Informasi Terapan), vol. 10, no. 3, pp. 119–129, 2024, doi: 10.33197/jitter.vol10.iss3.2024.2200.

Ishak Semuel Beno, “Analisis Teorema Sisa Cina dalan Dekripsi Data Text Terenkripsi RSA,” KOMBROF Jurnal Teknologi Informasi Papua (KJTIP), vol. 1, no. 1, pp. 40–44, 2023, doi: 10.31957/kjtip.v1i1.

Aminudin and Eko Budi Cahyono, “A practical analysis of the fermat factorization and pollard rho method for factoring integers,” Lontar Komputer: Jurnal Ilmiah Teknologi Informasi, vol. 12, no. 1, pp. 33–40, Apr. 2021, doi: 10.24843/LKJITI.2021.v12.i01.p04.

Gandhi Srushti and Ravi Gor, “DIGITAL IMAGE ENCRYPTION USING RSA AND LFSR,” International Journal of Engineering Science Technologies, vol. 6, no. 4, pp. 36–52, 2022, doi: 10.29121/ijoest.v6.i4.2022.351.




DOI: http://dx.doi.org/10.21927/ijubi.v8i1.5523

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Indonesian Journal of Business Intelligence (IJUBI)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Lisensi Creative Commons
IJUBI by https://ejournal.almaata.ac.id/index.php/IJUBI is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 

View My Stats
Indonesian Journal of Business Intelligence (IJUBI)
Department of Information System
Alma Ata University
Email: ijubi@almaata.ac.id