Implementasi Algoritma Rivest Shamir Adleman (RSA) Multiprima dan Chinese Remainder Theorem (CRT) pada Pengamanan Pesan Teks
Abstract
Keywords
References
Ni Komang Novia Widiasari and Emmy Febriani Thalib, “The Impact of Information Technology Development on Cybercrime Rate in Indonesia,” Journal of Digital Law and Policy, vol. 1, no. 2, pp. 73–86, Jan. 2022, doi: 10.58982/jdlp.v1i2.165.
Shuaib Ahmed Wadho, Areej Fatemah Meghji, Aun Yichiet, Roshan Kumar, and Farhan Bashir Shaikh, “Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review,” VAWKUM Transactions on Computer Sciences, vol. 11, no. 1, pp. 295–305, Jun. 2023, doi: 10.21015/vtcs.v11i1.1521.
Annisa Desianty and Imelda Imelda, “Systematic Literature Review: Cybersecurity by Utilizing Cryptography Using the Data Encryption Standard (DES) Algorithm,” Jurnal Teknik Informatika, vol. 17, no. 1, pp. 30–39, Apr. 2024, doi: 10.15408/jti.v17i1.37256.
Amosa Babalola, Ekuewa Bamidele, Olatunbosun Esther, and Oyetunji Olumayowa, “Cryptography: A Review,” International Journal of Advances in Engineering and Management (IJAEM), vol. 3, no. 10, pp. 1385–1391, Oct. 2021, doi: 10.35629/5252-031013851391.
Agus Triono, Apri Setia Budi, Rafi Abdillah, and Wahyudi, “IMPLEMENTASI PERETASAN SANDI VIGENERE CHIPHER MENGGUNAKAN BAHASA PEMROGRAMAN PYTHON,” JOCITIS-Journal Science Infomatica and Robotics, vol. 1, no. 1, pp. 1–9, Sep. 2023.
Muhammad Zaky Zachary, Sisilia Sylviani, and Edi Kurniadi, “Implementasi Algoritma RSA (Rivest-Shamir-Adleman) pada Kriptografi Klasik,” Mathematical Sciences and Applications Journal, vol. 4, no. 2, pp. 54–59, Apr. 2024, doi: 10.22437/msa.v4i2.28863.
Padmapriya V, Thanigaivelan A, Harish J, and Surya G, “Enhanced Integer Factor Optimization in RSA Cryptography using Shor Quantum,” International Journal of Research Publication and Reviews, vol. 5, no. 5, pp. 2009–2016, May 2024, doi: 10.55248/gengpi.
Aayush Shah, Prabhat Mahato, and Aadarsh Bhagat, “Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm,” International Journal for Research in Applied Science & Engineering Technology (IJRASET), vol. 11, no. VIII, pp. 1626–1642, Aug. 2023, doi: 10.22214/ijraset.2023.55341.
Tigus Juni Betri, Haya Nur Fadilah, and Galih Fajar Nugroho, “Data Science Analysis on UIN Raden Mas Said’s Media Accounts,” International Journal of Science and Applied Science: Conference Series, vol. 8, no. 1, pp. 76–85, 2024, doi: 10.20961/ijsascs.v7i2.96733.
Vineesh Cutting and Nehemiah Stephen, “A Review on using Python as a Preferred Programming Language for Beginners,” International Research Journal of Engineering and Technology (IRJET), vol. 8, no. 8, pp. 4258–4263, Aug. 2021.
Anahita Ghanad, “An Overview of Quantitative Research Methods,” INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY RESEARCH AND ANALYSIS, vol. 6, no. 8, pp. 3794–3803, Aug. 2023, doi: 10.47191/ijmra/v6-i8-52.
Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, and Mohammad Andri Budiman, “COMPARATIVE OF RIVEST-SHAMIR-ADLEMAN CRYPTOSYSTEM AND ITS FOUR VARIANTS USING RUNNING TIME AND MEMORY CONSUMPTION ANALYSIS,” Jurnal Teknologi (Sciences & Engineering), vol. 86, no. 4, pp. 181–190, 2024, doi: 10.11113/jurnalteknologi.v86.20723.
Shovan Mondal and Aji Primajaya, “THE IMPLEMENTATION OF RSA ALGORITHM IN TEXT MESSAGES ENCRYPTION AND DECRYPTION,” JATI (Jurnal Mahasiswa Teknik Informatika), vol. 8, no. 6, pp. 12620–12624, Dec. 2024, doi: 10.36040/jati.v8i6.12037.
Muhammad Arief Budiman, Edi Kurniadi, Sukono, and Sisilia Sylviani, “Metode Pemecahan Sistem Kongruensi Linear,” Mathematical Sciences and Applications Journal, vol. 5, no. 1, pp. 27–33, 2024, doi: 10.22437/msa.v5i1.38085.
Elvis Adam Alhassan et al., “On Some Algebraic Properties of the Chinese Remainder Theorem with Applications to Real Life,” Journal of Applied Mathematics and Computation, vol. 5, no. 3, pp. 219–224, 2021, doi: 10.26855/jamc.2021.09.008.
Panyawat Haarsa, “Solving Bernoulli’s Equations Using Python: Enhancing Student Understanding Through Inquiry-Based Learning,” Unnes Journal of Mathematics Education, vol. 13, no. 3, pp. 210–219, 2024, doi: 10.15294/ujme.v13i3.
Triloka Mahesti, Arum Febriyanti Ciptaningtyas, and Agni Astungkara, “Perbandingan Penggunaan Algoritma Kriptografi DES, RSA, Modifikasi DES dan Modifikasi RSA untuk Penyandian Database,” Jurnal Ilmiah ILKOMINFO - Ilmu Komputer & Informatika, vol. 8, no. 1, pp. 1–15, 2025, doi: 10.47324/ilkominfo.v8i1.294.
Divya and Upasna Setia, “Evaluating RSA Key Length: Impact on Security Hardness and Computational Efficiency,” Journal Publication of International Research for Engineering and Management (JOIREM), vol. 10, no. 8, pp. 1–6, Aug. 2024.
Asep Rizal Nurjaman, “PENANDA TANGANAN DOKUMEN DIGITAL PADA SISTEM PENYIMPANAN FILE MENGGUNAKAN KOMBINASI ALGORITMA SHA3-512 DAN RSA UNTUK MEMPERTAHANKAN KEASLIAN DATA DOKUMEN,” JITTER (Jurnal Ilmiah Teknologi Informasi Terapan), vol. 10, no. 3, pp. 119–129, 2024, doi: 10.33197/jitter.vol10.iss3.2024.2200.
Ishak Semuel Beno, “Analisis Teorema Sisa Cina dalan Dekripsi Data Text Terenkripsi RSA,” KOMBROF Jurnal Teknologi Informasi Papua (KJTIP), vol. 1, no. 1, pp. 40–44, 2023, doi: 10.31957/kjtip.v1i1.
Aminudin and Eko Budi Cahyono, “A practical analysis of the fermat factorization and pollard rho method for factoring integers,” Lontar Komputer: Jurnal Ilmiah Teknologi Informasi, vol. 12, no. 1, pp. 33–40, Apr. 2021, doi: 10.24843/LKJITI.2021.v12.i01.p04.
Gandhi Srushti and Ravi Gor, “DIGITAL IMAGE ENCRYPTION USING RSA AND LFSR,” International Journal of Engineering Science Technologies, vol. 6, no. 4, pp. 36–52, 2022, doi: 10.29121/ijoest.v6.i4.2022.351.
DOI: http://dx.doi.org/10.21927/ijubi.v8i1.5523
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Indonesian Journal of Business Intelligence (IJUBI)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
IJUBI by https://ejournal.almaata.ac.id/index.php/IJUBI is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
View My Stats
Indonesian Journal of Business Intelligence (IJUBI)
Department of Information System
Alma Ata University
Email: ijubi@almaata.ac.id