To see the other types of publications on this topic, follow the link: Algorytm ElGamala.

Journal articles on the topic 'Algorytm ElGamala'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Algorytm ElGamala.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Andrian, Yudhi. "Perbandingan Penggunaan Bilangan Prima Aman Dan Tidak Aman Pada Proses Pembentukan Kunci." Creative Information Technology Journal 1, no. 3 (2015): 194. http://dx.doi.org/10.24076/citec.2014v1i3.21.

Full text
Abstract:
Algoritma ElGamal merupakan algoritma dalam kriptografi yang termasuk dalam kategori algoritma asimetris. Keamanan algoritma ElGamal terletak pada kesulitan penghitungan logaritma diskret pada bilangan modulo prima yang besar sehingga upaya untuk menyelesaikan masalah logaritma ini menjadi sangat sukar. Algoritma ElGamal terdiri dari tiga proses, yaitu proses pembentukan kunci, proses enkripsi dan proses dekripsi. Proses pembentukan kunci kriptografi ElGamal terdiri dari pembentukan kunci privat dan pembentukan kunci public. Pada proses ini dibutuhkan sebuah bilangan prima aman yang digunakan sebagai dasar pembentuk kunci public sedangkan sembarang bilangan acak digunakan sebagai pembentuk kunci privat. Pada penelitian sebelumnya digunakan bilangan prima aman pada proses pembentukan kunci namun tidak dijelaskan alasan mengapa harus menggunakan bilangan prima aman tersebut. Penelitian ini mencoba membandingkan penggunaan bilangan prima aman dan bilangan prima tidak aman pada pembentukan kunci algoritma elgamal. Analisa dilakukan dengan mengenkripsi dan dekripsi sebuah file dengan memvariasikan nilai bilangan prima aman dan bilangan prima tidak aman yang digunakan untuk pembentukan kunci public dan kunci privat. Dari hasil analisa dapat disimpulkan bahwa dengan menggunakan bilangan prima aman maupun bilangan prima tidak aman, proses pembentukan kunci, enkripsi dan dekripsi tetap dapat berjalan dengan baik, semakin besar nilai bilangan prima yang digunakan, maka kapasitas cipherteks juga semakin besar.Elgamal algorithm is an algorithm in cryptography that is included in the category of asymmetric algorithms. The security of Elgamal algorithm lies in the difficulty in calculating the discrete logarithm on large number of prime modulo that attempts to solve this logarithm problem becomes very difficult. Elgamal algorithm is consists of three processes, that are the key generating, encryption and decryption process. Key generation of elgamal cryptography process is consisted of the formation of the private key and public key. In this process requires a secure prime number is used as the basis for forming public key while any random number used as forming of the private key. In the previous research is used secure prime number on key generating process but does not explain the reasons of using the secure primes. This research tried to compare using secure and unsecure primes in elgamal key generating algorithm. The analysis is done by encrypting and decrypting a file by varying the value of secure and unsecure of prime numbers that are used on generating of a public and a private key. From the analysis it can be concluded that using secure and unsecure of prime numbers, the process of key generating, encryption and decryption can run well, the greater value of prime numbers are used, the greater the capacity of the ciphertext.
APA, Harvard, Vancouver, ISO, and other styles
2

Neyman, Shelvie, and Selfi Qisthina. "Pengamanan Internet of Things untuk Tanda Tangan Digital Menggunakan Algoritme Elgamal Signature Scheme." Jurnal Ilmu Komputer dan Agri-Informatika 8, no. 1 (2021): 69–78. http://dx.doi.org/10.29244/jika.8.1.69-78.

Full text
Abstract:
Internet of Things (IoT) memungkinkan suatu objek menghasilkan data dan bertukar data. Pengaplikasian IoT menggunakan mikrokontroler seperti Arduino belum memiliki fitur untuk menjaga keamanan data di dalamnya. Selain itu, Arduino memiliki kapabilitas komputasi terbatas. Oleh karena itu, perlu diterapkan kriptografi dengan algoritme yang memiliki komputasi rendah pada Arduino untuk menjaga keamanan data. Penjagaan keamanan data terutama pada keaslian asal data, dilakukan dengan menggunakan tanda tangan digital. Penerapan tanda tangan digital dapat dilakukan salah satunya dengan algoritme Elgamal signature scheme. Penerapan tanda tangan digital menggunakan algoritme Elgamal signature scheme berhasil diterapkan pada perangkat Arduino Uno untuk melakukan tanda tangan digital dan verifikasi. Kinerja algoritme Elgamal signature scheme dilihat dari analisis waktu eksekusi dan analisis keamanan algoritme. Waktu eksekusi proses tanda tangan digital membutuhkan waktu lebih lama dibandingkan dengan waktu eksekusi proses verifikasi. Algoritme Elgamal signature scheme membutuhkan waktu dua kali lebih lama karena banyaknya perhitungan sistematis pada perangkat Arduino Uno. Proses verifikasi terbukti gagal jika ada perubahan data dan pasangan tanda tangan digital.
 Kata Kunci: Arduino, Elgamal signature scheme, internet of things, kriptografi, tanda tangan digital.
APA, Harvard, Vancouver, ISO, and other styles
3

Ramadani, Suci. "HYBIRD CRYPTOSYSTEM ALGORITMA HILL CIPHER DAN ALGORITMA ELGAMAL PADA KEAMANAN CITRA." METHOMIKA Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (2020): 1–9. http://dx.doi.org/10.46880/jmika.vol4no1.pp1-9.

Full text
Abstract:
Perkembangan Teknologi pada saat ini memungkinkan setiap orang untuk saling bertukar informasi tanpa ada batasan waktu dan jarak. Kemungkinan yang akan terjadi adanya kebocoran data pada saat proses pertukaran informasi yang dilakukan, oleh karena itu dalam pengiriman data khususnya citra, aspek keamanan, kerahasiaan dan efesiensi penyimpanan data sangat diperlukan. Jika informasi penting tersebut jatuh ke tangan orang yang salah, maka akan menyebabkan hal yang tidak diinginkan, contohnya manipulasi gambar dengan bentuk yang negatif dan dapat merugikan pemilik gambar. Salah satu metode yang digunakan untuk menjaga keamanan data tersebut adalah kriptografi dengan menggunakan salah satu teknik yaitu Elgamal. Kekuatan algoritma ini terletak pada sulitnya menghitung algoritma diskrit pada bilangan bulat prima yang didalamnya dilakukan operasi pekalian. Dalam penelitian ini, penulis menggabungkan antara Hill Cipher untuk melakukan penyandian enkripsi citra dan Algoritma Elgamal untuk mendekripsi kunci dari Hill Cipher. Citra pertama kali dienkripsi menggunakan Hill Cipher, kemudian kunci Hill Cipher tersebut dienkripsi dengan menggunakan Algoritma Elgamal. Implementasi sistem menggunakan bahasa pemograman Visual Basic Net 2010. Hasil implementasi dengan citra awal dienkrip memiliki waktu 4282.85 Milidetik dengan hasil gambar yang beracak-acak sedangkan citra yang sudah dienkrip akan kembali di deskripsikan yang memiliki waktu 20442.84 Milidetik dengan hasil citra kembali ke awal.
APA, Harvard, Vancouver, ISO, and other styles
4

Saputro, Triyas Hevianto, Nur Hidayati Hidayati, and Erik Iman H. Ujianto. "SURVEI TENTANG ALGORITMA KRIPTOGRAFI ASIMETRIS." Jurnal Informatika Polinema 6, no. 2 (2020): 67–72. http://dx.doi.org/10.33795/jip.v6i2.345.

Full text
Abstract:
Keamanan merupakan salah satu faktor penting dalam penyimpanan dan pengiriman data atau pesan. Salah satu cara untuk mengamankan dokumen adalah dengan menggunakan algoritma kriptografi. Kriptografi berdasarkan jenis kuncinya dibedakan menjadi dua yaitu kriptografi simetris dan asimetris. Algoritma enkripsi asimetris termasuk Rivest–Shamir–Adleman (RSA), Diffie-Hellman, Digital Secure Algorithm (DSA), XTR, Elliptic Curve Cryptography (ECC), dan Elgamal Encryption System (ESS). Dalam makalah ini akan melakukan survei paper terkait algoritma-algoritma enkripsi asimetris. Implementasi kriptografi asimetris dapat dikembangkan menggunakan algoritma-algoritma tersebut.
 
 Kata kunci : cryptography, encryption, decryption, public key
APA, Harvard, Vancouver, ISO, and other styles
5

Ramadani, Suci. "Hybird Cryptosystem Algoritma Hill Cipher Dan Algoritma ElGamal Pada Keamanan Citra." METHOMIKA: Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 4, no. 1 (2020): 1–9. http://dx.doi.org/10.46880/jmika.v4i1.138.

Full text
Abstract:
The development of technology at this time allows everyone to exchange information without any limitation of time and distance. The possibility that data leakage will occur during the process of exchanging information is carried out, therefore in sending data especially images, security aspects, confidentiality and efficiency of data storage is very necessary. If the important information falls into the wrong hands, it will cause unwanted things, for example manipulation of images with negative shapes and can harm the owner of the image. One method used to maintain data security is cryptography using one of the techniques, Elgamal. The strength of this algorithm lies in the difficulty of calculating discrete algorithms on prime integers in which multiplication operations are performed. In this research, the writer combines Hill Cipher to do image encryption and Elgamal Algorithm to decrypt the key of Hill Cipher. The image is first encrypted using the Hill Cipher, then the Hill Cipher key is encrypted using the Elgamal Algorithm. The implementation of the system uses the programming language Visual Basic Net 2010. The results of the implementation with the initial encrypted image has 4282.85 milliseconds with random images, while the encrypted image will be re-described as having 20442.84 milliseconds with the image returned to the beginning.
APA, Harvard, Vancouver, ISO, and other styles
6

Khatri, Shefali, Punit Sharma, Arvind Negi, and Himanshu Gupta. "Thwarting Sybil Attack using ElGamal Algorithm." International Journal of Computer Applications 121, no. 21 (2015): 44–48. http://dx.doi.org/10.5120/21828-5085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nguyen Duc, Toan, and Hong Bui The. "Building Background to the Elgamal Algorithm." International Journal of Mathematical Sciences and Computing 3, no. 3 (2017): 39–49. http://dx.doi.org/10.5815/ijmsc.2017.03.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sann, Zarni, Thi thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (2019): 105–11. http://dx.doi.org/10.11591/aptikom.j.csit.147.

Full text
Abstract:
Encryption is a well known technology for protecting sensitive data. ElGamal encryption and RSA algorithm is made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mails from mail server. This system is implemented to secure mail server system for local government’s important mail messages. These algorithms consume a considerable amount of time and resources such as memory, CPU time, and computation time to encrypt and decrypt data. In this paper, the results are comparison of these algorithms in term of encryption time, decryption time, and memory usage over variable file sizes. After processing, it is proven that RSA performs a faster encryption process than ElGamal. However, ElGamal decryption process is faster than RSA. This system is also expressed comparison of storage Size between RSA and ElGamal. Both of these algorithms are cryptographic public-key algorithms but have functions in different ways. This system is using C# programming language and SQL Server to store mail messages.
APA, Harvard, Vancouver, ISO, and other styles
9

Widarma, Adi. "COMBINATION AES, RC4 AND ELGAMAL ALGORITHM IN HYBRID SCHEME FOR DATA SECURITY." Computer Engineering, Science and System Journal 1, no. 1 (2016): 1–8. http://dx.doi.org/10.24114/cess.v1i1.4040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Atmaja, Niko Surya. "Kerahasiaan Teks Basis Data MySQL Menggunakan Algoritma Elgamal." Jurnal Sistim Informasi dan Teknologi 1, no. 4 (2019): 65–71. http://dx.doi.org/10.35134/jsisfotek.v1i4.17.

Full text
Abstract:
The common method used to secure a MySQL database is in access control. The technique is the use of a password. To better secure the data sent cryptographic techniques need to be done. This study uses the Elgamal method in conducting cryptography. The results of this study generate MySQL databases in random form during safer delivery and can only be accessed by parties who have a password. So this research can further improve MySQL data security
APA, Harvard, Vancouver, ISO, and other styles
11

Asri, Rahmadi, Mahyuddin K. M. Nasution, and Suherman Suherman. "Modification of chipertext Elgamal algorithm using split merge." Journal of Physics: Conference Series 1235 (June 2019): 012054. http://dx.doi.org/10.1088/1742-6596/1235/1/012054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Harahap, Ahir Yugo Nugroho, Heri Gunawan, Adnan Buyung Nst, and Ria Eka Sari. "PENERAPAN ELGAMAL GUNA MENINGKATKAN KEAMANAN DATA TEXT DAN DOCX." IT (INFORMATIC TECHNIQUE) JOURNAL 10, no. 1 (2022): 76. http://dx.doi.org/10.22303/it.10.1.2022.76-86.

Full text
Abstract:
<em>Keamanan data merupakan hal yang sangat penting dalam menjaga kerahasiaan informasi terutama yang berisi informasi sensitif yang hanya boleh diketahui isinya oleh pihak yang berhak saja, apalagi jika pengirimannya dilakukan melalui jaringan publik, apabila data tersebut tidak diamankan terlebih dahulu, akan sangat mudah disadap dan diketahui isi informasinya oleh pihak-pihak yang tidak bertanggung jawab. Oleh karena itu peneliti merekomendasikan algoritma Elgamal untuk dapat memberikan keamanan pada text dan docx, algoritma ElGamal adalah merupakan bagian dari kriptografi asimetris yang pembentukan salah satu kuncinya menggunakan bilangan prima dan menitik beratkan kekuatan kuncinya pada pemecahan masalah logaritma diskrit. Dengan memanfaatkan bilangan prima yang besar serta masalah logaritma diskrit yang cukup menyulitkan, maka keamanan kuncinya lebih terjamin</em>
APA, Harvard, Vancouver, ISO, and other styles
13

Ibrahim, Fachriyana Rizki, and Arry Avorizano. "Implementasi Algoritma ElGamal Dalam Proses Enkripsi dan Dekripsi Untuk Pengamanan Citra Digital Pada Perangkat Mobile." Prosiding Seminar Nasional Teknoka 4 (December 30, 2019): I83—I90. http://dx.doi.org/10.22236/teknoka.v4i0.4210.

Full text
Abstract:
Implementasi keamanan data adalah salah satu cara efektif dalam mengamankan data demi melindungi privasi dan keaslian data milik pengguna. Subjek dalam penelitian adalah bagaimana cara melindungi suatu file citra digital. Metode yang digunakan adalah Kriptografi ElGamal, metode tersebut adalah suatu bagiana dari kriptografi asimetris. Terdapat tiga proses didalam Kriptogtafi ElGamal, yaitu proses pembuatan kunci, proses enkripsi data dan proses dekripsi data. Metode yang digunakan pada penelitian ini adalah research dan development (R&D) yang dimulai dari identifikasi masalah sampai produksi prototipe akhir.
 Hasil dari penelitian ini di implementasikan dalam suatu program perangkat lunak pada perangkat Android dengan menggunakan bahasa pemrograman Java yang dapat memberikan kemudahan bagi setiap orang yang ingin mengamankan data – data gambar penting.
APA, Harvard, Vancouver, ISO, and other styles
14

Mawengkang, H., A. F. Siregar, and S. Efendi. "Combination analysis of ElGamal algorithm and LUC algorithm in file security." IOP Conference Series: Materials Science and Engineering 420 (October 1, 2018): 012130. http://dx.doi.org/10.1088/1757-899x/420/1/012130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Indahwati, Nonik, and Agus Prihanto. "Penerapan Algoritma Kriptografi Asimetris Elgamal dengan Modifikasi Pembangkit Kunci terhadap Enkripsi dan Dekripsi Gambar Warna." Journal of Informatics and Computer Science (JINACS) 1, no. 02 (2020): 97–103. http://dx.doi.org/10.26740/jinacs.v1n02.p97-103.

Full text
Abstract:
Abstrak— Perkembangan yang terjadi pada teknologi digital diikuti pula dengan perkembangan perilaku pada masyarakat yang dengan mudahnya menciptakan data maupun mengakses data pada media digital, kemudahan menggunakan media digital untuk mendokumentasikan momen dalam bentuk foto maupun video. Hal tersebut bukan hanya menimbulkan sebuah peluang dalam pengembangan aplikasi, namun juga akan membuka peluang adanya ancaman terhadap manipulasi, perusakan hingga pencurian data tersebut. Pentingnya nilai dari data dan informasi mengakibatkan data hanya boleh diakses oleh orang tertentu, apalagi jika data dan informasi tersebut merupakan aset bernilai yang diharuskan untuk dilindungi dengan perlindungan yang aman. Pada keamanan jaringan sangat diperlukan untuk menanggulangi ancaman pencurian data tersebut sehingga membutuhkan sebuah penerapan mekanisme keamanan jaringan menggunakan teknik-teknik penyandian. Penelitian ini mencoba untuk membuat sistem yang digunakan untuk proses enkripsi dan dekripsi gambar warna yang menggunakan algoritma asimetris elgamal dengan modifikasi pada pembangkit kunci. Adapun metode yang digunakan adalah algoritma elgamal.Pada penelitian ini algoritma elgamal dengan modifikasi pembangkit kunci mampu dengan baik memproses enkripsi dan dekripsi pada gambar warna. Perbandingan antara gambar asli dan gambar yang telah dienkripsi menggunakan PSNR (Peak Signal Noise Ratio). Secara keseluruhan sistem yang dihasilkan dari penelitian ini sudah berjalan dengan baik dan sesuai dalam melakukan enkripsi dan dekripsi. Waktu yang dibutuhkan untuk melakukan proses bergantung pada ukuran file serta untuk proses enkripsi lebih lama dibandingan dengan waktu yang dibutuhkan untuk proses dekripsi. Hasil perbandingan dari gambar yang diuji coba menghasilkan beberapa perbedaan yaitu gambar asli dengan gambar setelah dienkripsi terdapat perbedaan, sedangkan perbandingan gambar asli dengan gambar setelah didekripsi tidak terdapat perbedaan.Kata Kunci— Algoritma Elgamal, Kriptografi, Enkripsi, Dekripsi, Gambar Warna.
APA, Harvard, Vancouver, ISO, and other styles
16

Prayoga, Adek Imam, and Yusfrizal Yusfrizal. "APLIKASI PENGAMANAN FILE GAMBAR MENGGUNAKAN RAIL FENCE CIPHER DAN ELGAMAL BERBASIS DESKTOP." IT (INFORMATIC TECHNIQUE) JOURNAL 8, no. 2 (2021): 132. http://dx.doi.org/10.22303/it.8.2.2020.132-140.

Full text
Abstract:
<p><em>Keamanan komputer merupakan suatu cabang teknologi yang dikenal dengan nama keamanan informasi yang diterapkan pada komputer.</em> <em>Sasaran keamanan komputer antara lain adalah sebagai perlindungan informasi terhadap pencurian atau pemeliharaan ketersediaan, seperti dijabarkan dalam kebijakan keamanan. Dalam ilmu kriptografi, algoritma Rail Fence Cipher dan Elgamal dapat membantu menjaga keamanan file gambar sehingga terhindar dari pencurian dan kerusakan pada file gambar dari orang yang tidak bertanggung jawab. Algoritma Rail Fence Cipher dan Elgamal dapat dikatakan bagus dalam sebuah keamanan tetapi masih tergolong lemah jika diterapkan sendiri-sendiri, maka dari itu kedua algoritma tersebut digabungkan agar menjadi lebih baik. Implementasi program menggunakan bahasa pemrograman Visual Studio 2010. Hasil akan berupa aplikasi pengamanan file gambar berbasis desktop yang diharapkan dapat membantu dan mempermudah orang lain dalam mengamanankan sebuah file gambar agar terhidar dari penyalah gunaan orang yang tidak bertanggung jawab.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
17

S, Edy Victor Haryanto. "Optimizing the Confidentiality of Lecturer Database using Elgamal Algorithm." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 4 (2020): 4671–77. http://dx.doi.org/10.30534/ijatcse/2020/69942020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Pandey, Atul, Indivar Gupta, and Dhiraj Kumar Singh. "Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings." Journal of Mathematical Cryptology 15, no. 1 (2020): 266–79. http://dx.doi.org/10.1515/jmc-2019-0054.

Full text
Abstract:
AbstractElGamal cryptosystem has emerged as one of the most important construction in Public Key Cryptography (PKC) since Diffie-Hellman key exchange protocol was proposed. However, public key schemes which are based on number theoretic problems such as discrete logarithm problem (DLP) are at risk because of the evolution of quantum computers. As a result, other non-number theoretic alternatives are a dire need of entire cryptographic community.In 2016, Saba Inam and Rashid Ali proposed a ElGamal-like cryptosystem based on matrices over group rings in ‘Neural Computing & Applications’. Using linear algebra approach, Jia et al. provided a cryptanalysis for the cryptosystem in 2019 and claimed that their attack could recover all the equivalent keys. However, this is not the case and we have improved their cryptanalysis approach and derived all equivalent key pairs that can be used to totally break the ElGamal-like cryptosystem proposed by Saba and Rashid. Using the decomposition of matrices over group rings to larger size matrices over rings, we have made the cryptanalysing algorithm more practical and efficient. We have also proved that the ElGamal cryptosystem proposed by Saba and Rashid does not achieve the security of IND-CPA and IND-CCA.
APA, Harvard, Vancouver, ISO, and other styles
19

Alfiah, Fifit, Rio Sudarji, and Dzakwan Taqiyyuddin Al Fatah. "Aplikasi Kriptografi Dengan Menggunakan Algoritma Elgamal Berbasis Java Desktop Pada Pt. Wahana Indo Trada Nissan Jatake." ADI Bisnis Digital Interdisiplin Jurnal 1, no. 1 (2020): 22–34. http://dx.doi.org/10.34306/abdi.v1i1.114.

Full text
Abstract:
Kemajuan teknologi saat ini telah berpengaruh pada hampir semua aspek kehidupan manusia, yang dapat memudahkan untuk melakukan pertukaran data secara cepat, tak terkecuali dalam hal berkomunikasi. Namun dalam melakukan pertukaran data tersebut masih sangat kurang disadari. Salah satu dampak negatifnya yaitu adanya pencurian data. Oleh karena itu aspek keamanan dalam pertukaran informasi dan penyimpanan data sangatlah penting. Terutama pada bidang retail otomotif, dimana banyak data yang penting dan bersifat rahasia seperti data identitas customer, dan laporan keuangan. Karena begitu pentingnya data tersebut, maka dibutuhkan suatu metode yang dapat menjaga kerahasiaan data dan metode yang dimaksud adalah kriptografi. Algoritma yang digunakan adalah algoritma ElGamal. Algoritma ini merupakan bagian dari algoritma asimetris, proses enkripsi dan dekripsi masing-masing memiliki kunci yang berbeda. Tujuan dari penelitian ini untuk menemukan cara mengimplementasikan algoritma kriptografi ElGamal ke dalam bentuk aplikasi yang nyata serta menghasilkan aplikasi pengamanan data berbasis desktop yang mudah dimengerti dan digunakan oleh user. Penelitian ini menggunakan metode Pengumpulan data dan Pengembangan. Hasil dari penelitian ini akan diimplementasikan dalam sebuah program aplikasi menggunakan Bahasa pemrograman berbasis java desktop memberikan kemudahan untuk semua orang yang ingin mengamankan file penting. Pada aplikasi ini user harus membuat public key sebelum proses enkripsi dan private key sebelum proses dekripsi pada file.
APA, Harvard, Vancouver, ISO, and other styles
20

Wei, Wen Shan, Xian Xiao Meng, and Hai Hua Li. "Digital Signature Technology Research of Distance Education Network Security Authentication." Advanced Materials Research 267 (June 2011): 831–36. http://dx.doi.org/10.4028/www.scientific.net/amr.267.831.

Full text
Abstract:
Discuss the network security of distance education, analyze the digital signature technology of network security authentication in distance education and explore the application of sequential digital multi-signature and broadcasting digital multi-signature based on the ElGamal algorithm and the discrete logarithm in the management system of distance education network security.
APA, Harvard, Vancouver, ISO, and other styles
21

Fang, Yi, Linhu Cong, and Jianqiu Deng. "Research and Design of an Improved ElGamal Digital Signature Algorithm." IOP Conference Series: Materials Science and Engineering 569 (August 9, 2019): 052041. http://dx.doi.org/10.1088/1757-899x/569/5/052041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Aditya, Heru, Intan Nur Farida, and Risky Aswi Ramadhani. "Heru Aditya Penerapan Algoritma Elgamal dan SSL Pada Aplikasi Group Chat." Generation Journal 2, no. 1 (2018): 48. http://dx.doi.org/10.29407/gj.v2i1.12052.

Full text
Abstract:
Abstrak – Seiring dengan pesatnya perkembangan jaman dan majunya teknologi saat inimembawa pengaruh besar pada aspek kehidupan manusia, salah satu contohnya adalah dalam halkomunikasi. Chatting merupakan salah satu pilihan dalam berkomunikasi. Tujuan yang hendakingin dicapai adalah membuat sebuah aplikasi group chat dengan menerapkan algoritmakriptografi elgamal pada database pesannya dan SSL pada pengamanan jaringannya. Teknikpenelitian dalam penelitian ini adalah Penelitian Pengembangan atau Rekayasa TeknologiInformasi dengan subyek dosen wali dan mahasiswa kelas 4G angkatan 2013 Prodi TeknikInformatika Universitas Nusantara PGRI Kediri. Dari penelitian ini telah dihasilkan aplikasi grupchat. Aplikasi ini dibuat dengan menggunakan bahasa php, script jquery, dan database mysql.Berdasarkan penelitian direkomendasikan: (1) Aplikasi perlu ditambah menu pengiriman berupagambar, file dan emoticon. (2) Aplikasi perlu dirubah script jquerynya agar dapat dijalankan secaraonline. (3) Aplikasi perlu ditambahi fitur private chat sehingga dapat melakukan komunikasi denganmember lain satu per satu.
APA, Harvard, Vancouver, ISO, and other styles
23

Susilawati, Susilawati. "Perancangan Kunci Public RSA dan ElGamal pada Kriptografi untuk Kemananan Informasi." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 1, no. 2 (2018): 82. http://dx.doi.org/10.31289/jite.v1i2.1429.

Full text
Abstract:
<em>Penggunaan bilangan prima berukuran sangat besar pada kriptografi kunci public sangat diperlukan untuk menghindari proses dekripsi pesan secara tidak sah. Dalam implementasinya, pembangkitan bilangan prima berukuran sangat besar ini terkendala pada operasi perpangkatan dengan bilangan yang besar. Makalah ini membahas teknik pembangkitan bilangan berukuran sangat besar menggunakan algoritma Linear Congruential Generator (LCG) serta pengujian bilangan prima secara probabilistik menggunakan algoritma Miller-Rabin. Bilangan prima yang dihasilkan diuji dan dianalisa pada sistem kriptografi kunci public RSA dan ElGamal dengan tujuan untuk keamanan informasi.</em>
APA, Harvard, Vancouver, ISO, and other styles
24

Jeevitha, S., and N. Amutha Prabha N.Amutha Prabha. "Secure medical image steganography based on Discrete Wavelet Transformation and ElGamal encryption algorithm." International Journal Artificial Intelligent and Informatics 3, no. 1 (2022): 13–28. http://dx.doi.org/10.33292/ijarlit.v3i1.44.

Full text
Abstract:
The latest development in computing methodologies and related steganography based applications had created a novel practice such as telemedicine where patient diagnosis images or allied information can be used diagnosis practices that are located in remote areas. In order to provide accurate and effective telemedicine the flawless or seamless biomedical information is required from patient. With respect to this the medical data may remain prone to get corrupted by hackers or might get manipulated when transmitted through an insecure channel. The cryptosystems which are available are not efficient enough to solve the above mentioned issues. Hence, in this research work a much efficient and effective image steganography technique has been proposed in order to hide the confidential and important image information. We have incorporated Discrete Wavelet Transformation (DWT) technique instead of wavelet transform techniques to embed the secret message in the required cover images. Also, to assure continuous communication through insecure channel, a new model called ElGamal encryption cryptosystem model has been implemented which contains the steganography scheme which has been proposed and developed. To maintain the content of Region of Interest (ROI), Region of Non- Interest (RONI) is used to embed the secret information. The overall performance analysis reveals that the DWT with ElGamal encryption provides more efficient and also have high embedding capacity, imperceptibility when compared to other methods like Hamming code, Syndrome-Trellis Code (STC) and Rivest-Shamir- Adleman (RSA) based methods.
APA, Harvard, Vancouver, ISO, and other styles
25

Rachmawati, D., A. S. Harahap, and R. N. Purba. "A hybrid cryptosystem approach for data security by using triple DES algorithm and ElGamal algorithm." IOP Conference Series: Materials Science and Engineering 453 (November 29, 2018): 012018. http://dx.doi.org/10.1088/1757-899x/453/1/012018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Rofiq, Muhammad, and Bambang Tri Wahjo Utomo. "IMPLEMENTASI ALGORITMA ELGAMAL DALAM SISTEM LOCK BRANKAS BERBASIS MIKROKONTROLER ATMEGA16 DAN SMARTPHONE ANDROID." Jurnal Ilmiah Informatika 1, no. 1 (2016): 7–16. http://dx.doi.org/10.35316/jimi.v1i1.437.

Full text
Abstract:
Most of Safes lock system is still using conventional methods nowadays. The conventional method leads to the safes’ burglary. Some of the causes are the safes’ code that can be tracked easily and the key can be duplicated. Previous research on safes’ security has ever been done. The weakness of the study is there is no security system using cryptographic algorithms for data security. The development of a safes security system by implementing ElGamal algorithms is done by following the engineering approach with the stages of methods analysis and design system, implementation and testing of the analysis and the discussion of the overall system. In the analysis and design of mathematical models using ElGamal algorithms, uses fast powering theorems and applications design uses Object OrientedProgramming. In the analysis of hardware refers to the datasheet and calculation of the value of electrical characteristics of the circuit. In the safes lock system, the outcome of the research is a safes prototype which is equipped with enhancements that include a series of processing algorithms, the data viewer, a wireless data transfer device, the Android smartphone as a system of user authorization. For the lock safes systems is using a locked solenoid. The control system is done by a lock safes android smartphone via Bluetooth communication. The test results also indicate the system will open the safes if the code and the public key is entered correctly, and the system will not open if one of the codes or the public-keys are wrong or both are wrong.
APA, Harvard, Vancouver, ISO, and other styles
27

Hardi, S. M., J. T. Tarigan, and N. Safrina. "Hybrid cryptosystem for image file using elgamal and double playfair cipher algorithm." Journal of Physics: Conference Series 978 (March 2018): 012068. http://dx.doi.org/10.1088/1742-6596/978/1/012068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Surya Permana, Indra, Taufik Hidayat, and Rahutomo Mahardiko. "RAW DATA SECURITY BY USING ELGAMAL AND SHA 256 PUBLIC KEY ALGORITHM." TEKNOKOM 4, no. 1 (2021): 1–6. http://dx.doi.org/10.31943/teknokom.v4i1.53.

Full text
Abstract:
The development of information technology has grown exponentially and various of data collections and its method has been obtained. In the era of big data, data has now become an asset that held important values, while in the implementation of data delivery, it clearly is not always safe. One of the method to secure data delivery is data encryption using Cryptography. Cryptography provides an encryption service to secure data delivery by transforming it to random values so that it can no longer be read. The goal in this study was to produce an application that could be used to encrypt data, using ElGamal's cryptography method and hash checking using the SHA256 algorithm. After encryption, to ensure the encrypted data is still the original data without any changes or manipulation by unauthorized 3rd party then done by checking the hash generated using SHA256 algorithm. The data used in this study was a sample of raw data from the ATPWTP survey (ability to pay and willing to pay) conducted by the BPS Cirebon (Central Statistics) in 2019 and the data was in the form of Excel and txt files. The encryption process resulted in a cipher larger than the plaintext and takes longer for the data encryption process than during the data cipher decryption process.
APA, Harvard, Vancouver, ISO, and other styles
29

Sapna Kumari, C., C. N. Asha, U. Rajashekhar, and K. Viswanath. "Performance Analysis of Cloud-based Health Care Data Privacy System Using Hybrid Techniques." International Journal of Biology and Biomedical Engineering 16 (January 3, 2022): 46–63. http://dx.doi.org/10.46300/91011.2022.16.7.

Full text
Abstract:
At present, due to the various hacking approaches, the protection for any data transmitted through any channel or mode is one of the important issues. Nowadays, providing data security is satisfactory, developments are extended for obtaining data among the transceivers. Security level depends on the size of a symmetric key which is employed for encryption and decryption using various cryptography systems management and in modern approaches like block and RF codes including AES use a larger size of key simultaneously and there exists security problems due to hacking approaches. To illustrate the protection level and hacking problems, a new ECC is presented as well as by employing scalar duplication, the synchronous key is generated and consists of point doubling and point addition. The created focuses are encrypted before transmission by using ECC-Elgamal-Holomorphic (ECCEH) and transferred through a distant channel and encipher data is failed at the receiver using ECCEH which includes the reverse process. The unique standards of cryptography context have been generated by MATLAB; the defined framework has endeavored to the extent that speed, delay as well as control, and many others are accepted in MATLAB 2017a. The user of the sender, the original information is transformed into integer value by employing Holomorphic and encodes it by utilizing the Elgamal ECC algorithm which employs point doubling and point addition. The encoded information is uploaded into the cloud for storage, here www.thingspeak.com is utilized for storage. When the user presents at the receiver request the cloud to access from it, initially the cloud server authenticates the access control strategies of the requester, and then access is provided by the cloud server. If the user authenticates the strategies, then encoded data can download and the original data is decoded by synchronous key employing ECC- Elgamal algorithm. Using original and decrypted data, various performance factors are calculated in terms of execution time, packet delivery ratio, throughput, latency and compare these results with conventional methods and found to be 12%, 31%, 24%, and 8% progress concerned with packet delivery ratio, latency, outturn and execution time.
APA, Harvard, Vancouver, ISO, and other styles
30

Li, Huan, Ye Qi Ru, Yi Kang Li, and Hao Guo. "Information Security Protection Design of Electric Vehicles Charging Station." Applied Mechanics and Materials 741 (March 2015): 681–86. http://dx.doi.org/10.4028/www.scientific.net/amm.741.681.

Full text
Abstract:
Information security is fundamental to ensuring the normal operation of charging station. Based on CAN bus and 3G wireless network, this paper discusses current threats for communication network, builds a protection structure of information security, and proposes an overall information security protection framework. The firewall mainly includes digital signature authentication which combines SHA-1 message digest algorithm and ELGamal public key cipher system. Firewall-IDS (Intrusion Detection System) interactive modules and host information security protection modules is also designed. This paper lays a basic foundation for security construction of charging station’s communication network.
APA, Harvard, Vancouver, ISO, and other styles
31

Soundararajan, J. "ENHANCED SECURITY FOR HOP BY HOP WIRELESS SENSOR NETWORK USING ELGAMAL ENCRYPTION ALGORITHM." International Journal of Advanced Research in Computer Science 9, no. 2 (2018): 777–79. http://dx.doi.org/10.26483/ijarcs.v9i2.5918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Lokeshwari, G., S. Udaya Kumar, and Sree Vidya Susarla. "An Efficient Image Encryption Using Merkle-Hellman, Elgamal and Genetic Algorithm for Color Images." Applied Mechanics and Materials 719-720 (January 2015): 1140–47. http://dx.doi.org/10.4028/www.scientific.net/amm.719-720.1140.

Full text
Abstract:
The proliferation of digitized media due to rapid growth of network multimedia systems has created an urgent need for information security due to the ever increasing unauthorized manipulation and reproduction of original digital data. In this paper an approach based on Merkle-Hellman, ElGamal and Genetic algorithms is proposed for data encryption and decryption. The strength of the cipher is increased further by using genetic algorithm. Experimental results show that the proposed approach can be implemented on images of any size which retain the quality of the image while retrieving the original image. This aspect helps in providing the reduction in block size without compromise in the quality of the image and security as well.
APA, Harvard, Vancouver, ISO, and other styles
33

Hardi, Sri Melvani, Daniel Hamonangan, and Muahmmad Zarlis. "IMPLEMENTASI KRIPTOGRAFI HIBRID DENGAN ALGORITMA ELGAMAL DAN ALGORITMA ONETIME PAD(OTP) DALAM PENGAMANAN FILE AUDIO BERBASIS DESKTOP." TECHSI - Jurnal Teknik Informatika 10, no. 2 (2018): 129. http://dx.doi.org/10.29103/techsi.v10i2.903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Chowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (2020): 5162. http://dx.doi.org/10.3390/s20185162.

Full text
Abstract:
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
APA, Harvard, Vancouver, ISO, and other styles
35

Chen, Tzer Long, Yu Fang Chung, Jian Mao Hong, Jeng Hong Jhong, Chin Sheng Chen, and Tzer Shyong Chen. "A Hierarchical Access Control Scheme Based on Lagrange Interpolation and ELGamal Algorithm with Numerical Experiments." Applied Mechanics and Materials 385-386 (August 2013): 1705–7. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1705.

Full text
Abstract:
It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.
APA, Harvard, Vancouver, ISO, and other styles
36

Li, Bin, Chen Lei Cao, Jian Yi Liu, and Jin Xia Wei. "A New Delegation Provable Data Possession in Public Cloud Storage." Applied Mechanics and Materials 644-650 (September 2014): 2239–44. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2239.

Full text
Abstract:
Though Cloud storage has developed rapidly in recent years, there still exist some problems obviously. Provable Data Possession (PDP) is proposed to solve the problem of data integrity verification at untrusted cloud stores. This study built a new delegation Provable Data Possession (delegation-PDP), which solves problem when the client has no ability to check its remote data. We study the delegation-PDP and use proxy re-encryption to design it. Then we use the improved Elgamal-based algorithm to implement the scheme. Through security analysis and performance analysis, our protocol is provable secure and efficient.
APA, Harvard, Vancouver, ISO, and other styles
37

Guruprakash, J., and Srinivas Koppu. "EC-ElGamal and Genetic Algorithm-Based Enhancement for Lightweight Scalable Blockchain in IoT Domain." IEEE Access 8 (2020): 141269–81. http://dx.doi.org/10.1109/access.2020.3013282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Rachmawati, Dian, Mohammad Andri Budiman, and Cut Amalia Saffiera. "An Implementation Of Elias Delta Code And ElGamal Algorithm In Image Compression And Security." IOP Conference Series: Materials Science and Engineering 300 (January 2018): 012040. http://dx.doi.org/10.1088/1757-899x/300/1/012040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Budiman, M. A., E. M. Zamzami, and C. L. Ginting. "A Crypto Compression System Using ElGamal Public Key Encryption Algorithm and Even-Rodeh Codes." Journal of Physics: Conference Series 1566 (June 2020): 012071. http://dx.doi.org/10.1088/1742-6596/1566/1/012071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Enriquez, Michael, Den Whilrex Garcia, and Edwin Arboleda. "Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems." Indian Journal of Science and Technology 10, no. 27 (2017): 1–14. http://dx.doi.org/10.17485/ijst/2017/v10i27/105001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Garg, Gemini, and Jaspreet Kaur. "A Crossbreed approach to Enhanced Security of Multimedia Data using SKIP JACK and Elgamal Algorithm." International Journal of Computer Applications 129, no. 16 (2015): 1–5. http://dx.doi.org/10.5120/ijca2015906776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Goswami, Pinkimani, Madan Mohan Singh, and Bubu Bhuyan. "A new public key scheme based on DRSA and generalized GDLP." Discrete Mathematics, Algorithms and Applications 08, no. 04 (2016): 1650057. http://dx.doi.org/10.1142/s1793830916500579.

Full text
Abstract:
In this paper, we propose a new public key scheme, which is a combination of RSA variant namely the DRSA and the generalization of generalized discrete logarithm problem (generalized GDLP). The security of this scheme depends equally on the integer factorization of [Formula: see text] and the discrete logarithm problem (DLP) on [Formula: see text], where [Formula: see text] is the product of two large primes and [Formula: see text] is the multiplicative group modulo [Formula: see text]. The scheme is a randomized algorithm. It is at least as secure as the DRSA and ElGamal schemes. We also compare the encryption–decryption performance of the proposed scheme with the RSA and DRSA schemes.
APA, Harvard, Vancouver, ISO, and other styles
43

TAO, WANG, YI XIAN YANG, and XIN XIN NIU. "NEW EFFICIENT TIMED COMMITMENT SCHEMES." International Journal of Information Technology & Decision Making 02, no. 02 (2003): 287–97. http://dx.doi.org/10.1142/s0219622003000616.

Full text
Abstract:
A timed commitment is an extension to the standard commitment scheme in which there is a forced-open phase for the verifier to open the committed value even without the help of the committer. The first notion of timed commitment was from Boneh and Naor,2 based on the hardness of the best-known algorithm for computing g(2n) mod N. We use a different approach to design two new schemes. These two schemes are based upon ElGamal encryption and Pubic Verifiable Secret Sharing (PVSS) respectively. Unlike the original scheme, our schemes can be timed precisely, thus easy to be applied in some short-term schemes. We also discuss the implementation of our schemes in contract-signing schemes.
APA, Harvard, Vancouver, ISO, and other styles
44

Putra, Eko. "Implementation Of Eliptic Curve Cryptography Using The Elgamald Algorithm And Primary Number Generating Method Rabin-Miller For Text File Security." Journal Basic Science and Technology 11, no. 1 (2022): 32–39. http://dx.doi.org/10.35335/jbst.v11i1.1773.

Full text
Abstract:
The biggest weakness of Elliptic Curve Cryptography is the difficulty of points counting in elliptic curve which affects the process time. This paper considers a method of simplifying the counting in Elliptic Curve Cryptography and quickening the process time without decreasing the security level. Using ElGamal Algorithm as method of encryption, the implementation also involves Rabin-Miller Prime Number Generator to generate the public key. The system is tested using five different text files with different sizes and lengths. The result shows that by limiting the value of a and b to 1 in the elliptic curve function and also limiting the prime number down to two digits, successfully quicken the process time, the encryption process also takes only a small amount of time.
APA, Harvard, Vancouver, ISO, and other styles
45

Bufalo, Michele, Daniele Bufalo, and Giuseppe Orlando. "A Note on the Computation of the Modular Inverse for Cryptography." Axioms 10, no. 2 (2021): 116. http://dx.doi.org/10.3390/axioms10020116.

Full text
Abstract:
In literature, there are a number of cryptographic algorithms (RSA, ElGamal, NTRU, etc.) that require multiple computations of modulo multiplicative inverses. In this paper, we describe the modulo operation and we recollect the main approaches to computing the modulus. Then, given a and n positive integers, we present the sequence (zj)j≥0, where zj=zj−1+aβj−n, a<n and GCD(a,n)=1. Regarding the above sequence, we show that it is bounded and admits a simple explicit, periodic solution. The main result is that the inverse of a modulo n is given by a−1=⌊im⌋+1 with m=n/a. The computational cost of such an index i is O(a), which is less than O(nlnn) of the Euler’s phi function. Furthermore, we suggest an algorithm for the computation of a−1 using plain multiplications instead of modular multiplications. The latter, still, has complexity O(a) versus complexity O(n) (naive algorithm) or complexity O(lnn) (extended Euclidean algorithm). Therefore, the above procedure is more convenient when a<<n (e.g., a<lnn).
APA, Harvard, Vancouver, ISO, and other styles
46

Rachmawati, Dian, Amer Sharif, and Ericko. "Hybrid Cryptosystem Combination Algorithm Of Hill Cipher 3x3 and Elgamal To Secure Instant Messaging For Android." Journal of Physics: Conference Series 1235 (June 2019): 012074. http://dx.doi.org/10.1088/1742-6596/1235/1/012074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Narasimha Nayak, V., M. Ravi Kumar, K. Anusha, and Ch Kranthi Kiran. "FPGA based asymmetric crypto system design." International Journal of Engineering & Technology 7, no. 1.1 (2017): 612. http://dx.doi.org/10.14419/ijet.v7i1.1.10788.

Full text
Abstract:
In the network security system cryptography plays a vital role for the secure transmission of information. Cryptography is a process of integrating and transferring the data to the genuine users against any attacks. There are two types of Cryptographic algorithm: Symmetric and Asymmetric algorithms. In the symmetric type cryptography, single key is used for both encryption and decryption. Symmetric algorithms are fast and simple. Asymmetric cryptographic algorithm uses different keys such as public key to encrypt the message at sender and private key which is known only to receiver for decrypting the encrypted message. Asymmetric algorithms are more secure and difficult, to decrypt the message unless hacker acquires the knowledge of private key. A new Asymmetric algorithm with Error Detection and Correction mechanism is proposed that can reduce hardware, and improves decryption time and security. Proposed Asymmetric algorithm uses the few properties of: RSA, Diffie-Hellman and ElGamal Algorithms. Performance of asymmetric algorithms is compared with proposed algorithm, which is designed using Verilog HDL. Algorithms are synthesized, simulated, implemented using Vivado and targeted for Artix-7 XC7A100T-1CSG324Carchitecture.Chipscope Pro logic analyzer-Virtual Input Output core is binded to design for hardware debugging, to monitor and capture the output signals at selected specified state by applying random input stimuli at runtime in Nexys4 DDR FPGA Board.
APA, Harvard, Vancouver, ISO, and other styles
48

Purnomo Sidik, Agung, Syahril Efendi, and Suherman Suherman. "Improving One-Time Pad Algorithm on Shamir’s Three-Pass Protocol Scheme by Using RSA and ElGamal Algorithms." Journal of Physics: Conference Series 1235 (June 2019): 012007. http://dx.doi.org/10.1088/1742-6596/1235/1/012007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Sulistiyorini, Sulistiyorini, and Agus Prihanto. "Perbandingan Efisiensi Algoritma RSA dan RSA-CRT Dengan Data Teks Berukuran Besar." Journal of Informatics and Computer Science (JINACS) 1, no. 02 (2020): 84–90. http://dx.doi.org/10.26740/jinacs.v1n02.p84-90.

Full text
Abstract:
Abstrak— RSA (Rivest Shamir Adleman) merupakan algoritma asimetris yang paling banyak digunakan dalam kriptografi. Dalam beberapa penelitian menyebutkan bahwa proses RSA memakan waktu yang cukup lama. Untuk mempercepat waktu proses dari RSA dilakukan penambahan suatu algoritma CRT (Chinese Remainder Theorem) untuk mengurangi perhitungan aritmatika modular dengan modulus besar dalam RSA yang disebut RSA-CRT. Dalam penelitian ini penulis akan membandingkan dua algoritma asimetris yaitu RSA (Rivest Shamir Adleman) dengan modifkasi RSA yaitu RSA-CRT (Rivest Shamir Adleman-Chinese Remainder Theorem) pada data teks berukuran besar dari segi efisiensi waktu. Algoritma RSA dan RSA-CRT digunakan untuk mengenkripsi dan mendekripsi suatu data teks berukuran 5 mb, 10 mb, 15 mb dan 20 mb untuk dibandingkan efisiensi waktu atau segi kecepatan prosesnya. Hasil pengujian waktu dari penilitian ini menunjukkan bahwa nilai waktu dari proses enkripsi antara algoritma RSA dan RSA-CRT tergolong sama sebab kunci publik yang digunakan rumusnya memang sama. Sedangkan dari proses dekripsi menunjukkan bahwa algoritma RSA-CRT lebih cepat dari pada algoritma RSA biasa. Dari pengujian kecocokan kunci menunjukkan bahwa kunci yang bangkitkan dan digunakan untuk proses enkripsi dekripsi harus berpasangan antara kunci publik dan kunci privatnya. Hasil pengujian ukuran file dari proses enkripsi mengalami kenaikan dengan rata-rata 42.757 kb, sedangkan dari proses dekripsi berkurang dengan rata-rata 0,007 kb dikarenakan terdapat karakter yang tidak dikenali sistem yaitu simbol bullets list yang mengakibatkan file tidak dapat kembali 100% seperti semula. Sehingga dapat disimpulkan bahwa dalam proses dekripsi suatu data teks berukuran besar algoritma RSA- CRT memiliki efisiensi waktu 50% dibandingkan dengan algoritma RSA biasa.Kata Kunci— Algoritma Elgamal, Kriptografi, Enkripsi, Dekripsi, Gambar Warna.
APA, Harvard, Vancouver, ISO, and other styles
50

Wang, Yiting, Weiqiang Qiu, Ling Dong, et al. "Proxy Signature-Based Management Model of Sharing Energy Storage in Blockchain Environment." Applied Sciences 10, no. 21 (2020): 7502. http://dx.doi.org/10.3390/app10217502.

Full text
Abstract:
Sharing energy storage (SES) is a novel business model in order to increase the profits and improve the utilization rate of idle energy storage facilities. On the other hand, blockchains can be competently applied in the transaction and operation of SES because of distributed network architecture, traceability and tamper proof. In this paper, a management model of SES based on proxy signatures in the blockchain environment is proposed. Many management models including the principal-agent model are analyzed for SES in terms of benefit, cost, resources, and so on. Moreover, a blockchain framework and a typical transaction process of SES is presented. Finally, a proxy signature mechanism based on the ElGamal algorithm is proposed in order to address the problem that the signature power of nodes cannot be transferred on blockchains. Simulation results show that the proposed proxy signature mechanism can achieve the delegation of digital signature power under the premise of security and reliability, which is suitable for the management model of SES on blockchains.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography