Abstract
Digital data or documents in the exchange process in a network, must be completely safe, intact, and always kept confidential, this is the background for the need for a system that can guarantee the security and confidentiality of the data and documents in the data transfer process. This research makes a design of a data security program in sending documents using the RSA cryptographic algorithm and the XOR algorithm. The RSA algorithm involves two keys in encryption, namely the public key and the private key. The public key can be distributed to various parties to perform encryption or decryption. Messages that have been encrypted with the public key can only be decrypted using the private key. XOR algorithm is a cryptographic technique (encoding) data that uses the principle of XOR logic in the encryption and description process. Analysis of the Encryption Process and Description of the XOR method The encryption algorithm using XOR is to XOR plaintext (P) with key (K) to produce ciphertext. By using the prototype method in carrying out the research stages, the applications built have undergone adjustments according to requests/input from application users. The application can run well because it can encrypt and decrypt documents in sending email from within the application. Then from the test results obtained the greater the bit strength of the key, the greater the processing time required to generate the key, secondly the larger the file size, the greater the processing time required for encryption/decryption. The file format does not affect the processing time, and thirdly, the greater the bit strength, the faster the encryption time
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.