2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) 2017
DOI: 10.1109/iccubea.2017.8463720
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Encryption Algorithms (RSA, SRNN and 2 Key Pair) for Information Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 1 publication
0
11
0
1
Order By: Relevance
“…RSA ALGORITHM RSA was proposed in 1977 and is the patent of Ron Rivest, Adi Shamir, and Len Adleman, which was published in 1978 at the Massachusetts Institute of Technology [25]. RSA as a public cryptographic scheme per literature is known to have a lot of weaknesses and also with higher execution time [25]. Hence the effort by researchers to propose variant RSA to raise its security strength while reducing execution time.…”
Section: Algorithm 2 Rsamentioning
confidence: 99%
“…RSA ALGORITHM RSA was proposed in 1977 and is the patent of Ron Rivest, Adi Shamir, and Len Adleman, which was published in 1978 at the Massachusetts Institute of Technology [25]. RSA as a public cryptographic scheme per literature is known to have a lot of weaknesses and also with higher execution time [25]. Hence the effort by researchers to propose variant RSA to raise its security strength while reducing execution time.…”
Section: Algorithm 2 Rsamentioning
confidence: 99%
“…Respectively, the public-key of the user sends it in combination with the request, the public-key that he has created to be used for the verification of his identity through the control of the digital signature. The smart contract key is also a pair of keys generated by the authenticator which are attached to the smart contract delivered to the user so that he can decrypt the data he received but at the same time follow the rules of the smart contract so that there is control over the use of data by the system [ 24 , 25 ].…”
Section: The Proposed Systemmentioning
confidence: 99%
“…Dari perbandingan algoritma RSA, SRNN, dan 2 key pair membandingkan data dengan ukuran file antara 1 KB hingga 150 KB. Dengan menggunakan fungsi library pada JAVA, didapatkan hasil bahwa untuk mengenkripsi file, algoritma RSA dan 2 key pair membutuhkan waktu lebih lama dari pada algoritma SRNN [7]. Sehingga dalam perbandingan kecepatan enkripsi, algoritma SRNN lebih cepat dibandingkan algoritma RSA dan 2 key pair.…”
Section: Pendahuluanunclassified