Utilization of the RSA Algorim in Business Communication in Making e-Commerce Applications

Fauzi Fauzi, Muhammad Fachry

Abstract


Cryptography is a science or art of securing messages and is carried out by cryptographers. Data that is secured includes several aspects such as message security such as confidentiality, data integrity, and authentication. One cryptographic algorithm that is often used in the process of data security is the RSA algorithm. RSA is short for the names of the inventors of this algorithm, namely Ron, Shamir and Adleman. RSA is an algorithm that uses the concept of public key creation (the asymmetry / key used to encrypt is different from that used to decrypt). Where the applications made with Webbase in their security are still often using the MD5 and Sha algorithms so that additional security is needed in securing the existing education in making e-Commerce.
Keyword : RSA, Business, Communication, e-Commerce.

Full Text:

PDF

References


Fauzi, F., Al-Khowarizmi, A. K., & Muhathir, M. (2020). The e-Business Community Model is Used to Improve Communication Between Businesses by Utilizing Union Principles. JITE (JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING), 3(2), 252-257.

Ramadhani, F., Ramadhani, U., & Basit, L. (2020). Combination of Hybrid Cryptography In One Time Pad (OTP) Algorithm And Keyed-Hash Message Authentication Code (HMAC) In Securing The Whatsapp Communication Application. Journal of Computer Science, Information Technology and Telecommunication Engineering, 1(1), 31-36.

Lubis, A. R., Lubis, M., & Azhar, C. D. (2019). The Effect of Social Media to the Sustainability of Short Message Service (SMS) and Phone Call. Procedia Computer Science, 161, 687-695.

Al-Khowarizmi, A. K., Nasution, I. R., Lubis, M., & Lubis, A. R. (2020). The effect of a SECoS in crude palm oil forecasting to improve business intelligence. Bulletin of Electrical Engineering and Informatics, 9(4).

Lubis, A. R., Lubis, M., Al-Khowarimi, & Listriani, D. (2019, August). Big Data Forecasting Applied Nearest Neighbor Method. In 2019 International Conference on Sustainable Engineering and Creative Computing (ICSECC) (pp. 116-120). IEEE.

Stiawan, D. (2013). E-commerce.

Hidayat, R. A. (2012). Web E-Comerce Pada Tripio Komputer Menggunakan Pendekatan Business To Custemer (B2c). Telematika, 5(2).

Gultom, E. (2018). PERLINDUNGAN TRANSAKSI ELECTRONIC COMMERCE MELALUI LEMBAGA ASURANSI. Jurnal Legislasi Indonesia, 5(4), 53-73.

Shopiah, S. (2019). PENGARUH E-COMMERCE TERHADAP PERILAKU KONSUMEN MAHASISWA FKIP UNIVERSITAS PASUNDAN (Studi Kasus Mahasiswa Program Studi Pendidikan Bahasa, Sastra Indonesia dan Daerah FKIP Unpas Angkatan 2016) (Doctoral dissertation, FKIP UNPAS).

Karay, J. B., Sembiring, I., & Purnomo, H. D. (2017). Pemetaan Berbagai Permasalahan dalam Security E-Commerce.

Arrijal, I. M. A., Efendi, R., & Susilo, B. (2016). Penerapan Algoritma Kriptografi Kunci Simetris Dengan Modifikasi Vigenere Cipher Dalam Aplikasi Kriptografi Teks. Pseudocode, 3(1), 69-82.

Ariyus, D. (2008). Pengantar ilmu kriptografi: teori analisis & implementasi. Penerbit Andi.

Handoko, L. B., & Umam, C. (2019). PENYEMBUNYIAN PESAN MENGGUNAKAN STEGANOGRAFI DENGAN METODE LSB DAN ENKRIPSI KRITOGRAFI.

Wahyadyatmika, A. P., Isnanto, R. R., & Somantri, M. (2014). Implementasi Algoritma Kriptografi RSA pada Surat Elektronik (E-Mail). TRANSIENT, 3(4), 442-450.

Putra, S. S., Sasongko, P. S., & Bahtiar, N. (2011). Verifikasi Kepemilikan Citra Medis dengan Kriptografi RSA dan LSB Watermarking. JURNAL SAINS DAN MATEMATIKA, 19(3), 75-81.




DOI: https://doi.org/10.55311/aiocsit.v1i1.7

Refbacks

  • There are currently no refbacks.