Implementasi Algoritma Quicksort Untuk Pembangkitan Kunci Algoitma RSA Pada Pengamanan Data Audio
DOI:
https://doi.org/10.47065/jieee.v2i1.392Keywords:
Cryptography; Modification; Key; Sorting; Quicksort Algorithm; RSA AlgorithmAbstract
The RSA algorithm has two keys, namely the public key and the private key. This algorithm has security which lies in the difficulty in calculating discrete algorithms. Both encryption and decryption keys are integers. The RSA algorithm is a type of asymmetric cryptography algorithm, which consists of two keys, namely the public key for encryption and the private key for decryption. In the RSA algorithm, the distributed key is a public key which is not required to be kept secret while the private key is either stored or not distributed. Everyone who has the public key can perform the encryption process but the results of the encryption can only be read by the person who has the private key. To increase the strength of the algorithm, the key used to perform the encryption and decryption process will be modified first using a randomization algorithm, namely the Quicksort Algorithm. The Quicksort algorithm is a sorting algorithm developed by Tony Hoare, the average sorting performance is O (n log n) to sort n items. The purpose of using the Quicksort algorithm is to make the resulting key more difficult to guess, making it difficult for cryptanalysts to read the message or information.
Downloads
References
. Caroline, Maureen Linda. “Perbandingan Algoritma Kriptografi Kunci Publik RSA, Rabin dan ElGamal”. Program Studi Teknik Informatika Institut Teknologi Bandung, Bandung, 2011.
. Listiyono, Hersatoto. “Implementasi Algoritma Kunci Public Pada Algoritma RSA”. Fakultas Teknologi Informasi, Universitas Stikubank, Semarang, 2009..
. Munir, Rinaldi. Kriptografi, Informatika, Bandung. 2006.
. R. Sadikin, KRIPTOGRAFI UNTUK KEAMANAN JARINGAN. YOGYAKARTA: C.V ANDI OFFSET, 2012
. Rinaldi Munir, M.T. Algoritma RSA dan ElGamal, Bandung, 2004
. R. Sedgewick. Implementing quicksort programs. Comm. ACM, 21:847– 856, 1978.
. Amir Hamzah Suleiman, Media Audio-Visual Untuk Pengajaran, Penerangan dan Penyuluhan. Jakarta : PT Gramedia. 1985
. R. Zendrato and A. U. Hamdani, “Pemodelan Sistem Informasi Pengadaan Alat dan Bahan Praktikum Menggunakan Unified Modeling Language (Studi Kasus: Program Pendidikan Dokter Gigi Spesialis Konservasi Gigi Fakultas Kedokteran Gigi Universitas XYZ),” Konf. Nas. Teknol. Inf. dan Komput., vol. I, no. 1, pp. 86–95, 2017.
. I. Fahmi, Manajemen Pengambilan Keputusan Teori dan Aplikasi. Bandung: PT. Alfabeta, 2016.
. Z. I, “Pemodelan Berbasis UML (Unified Modeling Language) dengan Strategi Teknik Orientasi User Centered Design (UCD) dalam Sistem Administrasi Pendidikan,” Univ. Islam Negeri Sumatra Utara Medan, no. January 2013, 201.
. W. Komputer, Membuat Aplikasi Client Server dengan Visual Basic 2008. Yogyakarta: Andi, 2010
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma Quicksort Untuk Pembangkitan Kunci Algoitma RSA Pada Pengamanan Data Audio
ARTICLE HISTORY
Issue
Section
Copyright (c) 2022 Muhammad Rido Hasibuan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).