Performance Analysis of RC4 Symmetric and RSA Asymmetric Cryptographic Algorithms In Securing Normal Text Messages

Renaldi R

Abstract


Information security plays a crucial role in the digital age, particularly in safeguarding text messages from unauthorized access. Cryptography serves as a means of data security by employing encryption algorithms that transform the original message into a format that is hard to comprehend. This thesis examines the performance evaluation of two cryptographic algorithms: RC4, a symmetric algorithm, and RSA, an asymmetric algorithm, in the protection of regular text messages. This research centers on comparing the two algorithms regarding their encryption and decryption speeds, along with their effectiveness in masking the character frequency pattern present in the original text message. Testing was conducted with various short, medium, and long text documents. The test outcomes indicate that RC4 excels in speed for both encryption and decryption processes, particularly when handling large texts. Nonetheless, RSA excels in security due to its capacity to generate a more random and unpredictable character frequency distribution.


Full Text:

PDF

References


Ainafatul Nur Muslikah, Riswanto, H. R., Safinah, K., & Holle, K. F. H. (2020). Implementasi Teknik Kriptografi Rsa Untuk Pengamanan Data Pengiriman Sms. Jurnal Ilmiah Informatika, 5(1), 61–66. https://doi.org/10.35316/jimi.v5i1.749

Arianti, T., Fa’izi, A., Adam, S., & Mira Wulandari. (2022). Perancangan Sistem Informasi Perpustakaan Menggunakan Diagram Uml (Unified Modelling Language). Jurnal Ilmiah Komputer …, 1(1), 19–25. https://journal.polita.ac.id/index.php/politati/article/view/110/88

Arif, Z., & Nurokhman, A. (2023). Analisis Perbandingan Algoritma Kriptografi Simetris Dan Asimetris Dalam Meningkatkan Keamanan Sistem Informasi Comparative Analysis of Symmetric and Asymmetric Cryptographic Algorithms in Improving Information System Security. In JTSI (Vol. 4, Issue 2).

Azhari, M., Perwitosari, J., & Ali, F. (2022). Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES). Jurnal Pendidikan Sains Dan Komputer, 2(1), 2809–476. https://doi.org/10.47709/jpsk.v2i1.1390

Basri, H., Teknik Elektro, P., Teknik Universitas Muhammadiyah Lampung, F., Lingkar Selatan, J., Bantul, K., Zainal Abidin Pagar Alam No, J. H., & Lampung, B. (2020). Pembuatan Aplikasi Penjualan Buku Berbasis Java Desktop dengan Netbeans (Creating a Java Desktop based Book Sales Application with Netbeans). Jurnal IlmiahTeknik Elektro UML, 1(1).

Dakhi, O., Masril, M., Novalinda, R., Jufrinaldi, J., & Ambiyar, A. (2020). Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Cipher. INVOTEK: Jurnal Inovasi Vokasional Dan Teknologi, 20(1), 27–36. https://doi.org/10.24036/invotek.v20i1.647

Dhika, H., Isnain, N., & Tofan, M. (2019). Manajemen Villa Menggunakan Java Netbeans Dan Mysql. IKRA-ITH INFORMATIKA : Jurnal Komputer Dan Informatika, 3(2), 104–110.

Fitriana, R. N., & Djuniadi, D. (2022). Analisis Perbandingan Algoritma AES Dan RC4 Pada Enkripsi dan Dekripsi Data Teks Berbasis CrypTool 2. Systemic: Information System and Informatics Journal, 7(2), 1–7. https://doi.org/10.29080/systemic.v7i2.1263

Maulana, M. M., Azanuddin, & Suharsil. (2020). Pengamanan Data Surat-Surat Berharga di Kantor Notaris Susanto, S.H., M.Kn., Menggunakan Kriptografi Dengan Metode Rives Code 4 (R4). Jurnal CyberTech, September, 1–10.

Prasetya, A. F., Sintia, & Putri, U. L. D. (2022). Perancangan Aplikasi Rental Mobil Menggunakan Diagram UML (Unified Modelling Language). Jurnal Ilmiah Komputer Terapan Dan Informasi, 1(1), 14–18.

Rasudin, R., Zulfan, Z., & Rizki, P. (2022). Analisis Perbandingan Keamanan Kriptografi Klasik Pada Algoritma Secure Hill Cipher Berbasis Kode Ascii Dan Monoalphabetic. Jurnal Teknologi Terapan and Sains 4.0, 3(1), 729. https://doi.org/10.29103/tts.v3i1.9411

Riza, F., Sridewi, N., Husein, A. M., & Harahap, M. K. (2018). Analisa Frekuensi Hasil Enkripsi Pada Algoritma Kriptografi Blowfish Terhadap Keamanan Informasi. Jurnal Teknologi Dan Ilmu Komputer Prima (JUTIKOMP), 1(1), 11–15. https://doi.org/10.34012/jutikomp.v1i1.233

Rizky Dzullian, M. (2022). Perancangan Sistem Informasi Penjualan Berbasis Java Netbeans. Blend Sains Jurnal Teknik, 1(2), 76–87. https://doi.org/10.56211/blendsains.v1i2.112

Rosaly, R., & Prasetyo, A. (2020). Flowchart Beserta Fungsi dan Simbol-Simbol. Journal of Chemical Information and Modeling, 2(3), 5–7.

Sary, Y., & Al-iksan, F. (2022). Cryptography Generator for Prevention SQL Injection Attack In Big Data. Journal of Computer Science, Information Technology and Telecommunication Engineering, 3(2), 292–298. https://doi.org/10.30596/jcositte.v3i2.11566

Sina, D. R., Kiu, G. A., Djahi, B. S., & Pandie, E. S. Y. (2022). Aplikasi Keamanan Pesan (.Txt) Menggunakan Metode Triple Des Dan Metode Kombinasi Lsb Dan Blum-Blum-Shub. Jurnal Komputer Dan Informatika, 10(2), 204–209. https://doi.org/10.35508/jicon.v10i2.8465

Siregar, S. J., Nugroho, N. B., & Sigalingging, H. (2023). Implementasi Algoritma Kriptografi RSA (Rivest Shamir Adleman) Dalam Pengamanan Data Gaji Karyawan Di Kantor BSPJI. Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika Dan Komputer), 22(2), 528. https://doi.org/10.53513/jis.v22i2.9409

Suhandinata, S., Rizal, R. A., Wijaya, D. O., Warren, P., & Srinjiwi, S. (2019). ANALISIS PERFORMA KRIPTOGRAFI HYBRID ALGORITMA BLOWFISH DAN ALGORITMA RSA. JURTEKSI (Jurnal Teknologi Dan Sistem Informasi), 6(1), 1–10. https://doi.org/10.33330/jurteksi.v6i1.395

Widyastuti, R., Amelia, R., Gea, Y. Y., Murlena, M., & Syahindra, W. (2022). Perancangan Aplikasi Administrasi Pada Fakultas Keguruan dan Ilmu Pendidikan Menggunakan Java Netbeans Ide 8.1 dan Mysql. Arcitech: Journal of Computer Science and Artificial Intelligence, 2(2), 103. https://doi.org/10.29240/arcitech.v2i2.6498

Widyawan, D., & Imelda, I. (2021). Pengamanan File Menggunakan Kriptografi Dengan Metode Aes-128 Berbasis Web Di Komite Nasional Keselamatan Transportasi. Skanika, 4(1), 15–22. https://doi.org/10.36080/skanika.v4i1.2216

Yanto, M., Bima, P. E., Bahron, M., & Ikasari, I. H. (2023). Pemrograman Menggunakan Java NetBeans. BIIKMA : Buletin Ilmiah Ilmu Komputer Dan Multimedia, 1(3), 367–377. https://jurnalmahasiswa.com/index.php/biikma/article/view/555




DOI: https://doi.org/10.55311/aiocsit.v5i1.317

Refbacks

  • There are currently no refbacks.