Feasibility Analysis Of Rsa Algorithm In Security Of Lecturer Performance Data

Authors

  • Muhammad Fikry Department of Informatics. Faculty of Engineering, Universitas Malikussaleh
  • Bustami Department of Informatics. Faculty of Engineering, Universitas Malikussaleh

Keywords:

lecturer performace, cryptography, RSA

Abstract

Lecturer performance data is an important data that must be possessed by every lecturer and institution, therefore efforts are needed to ensure quality management of the university. For this reason, it is necessary to get the right algorithm to secure data. The RSA (Rivest- hamir-Adleman) algorithm is one of the public key algorithms in the field of cryptography which is popular and widely used today. The number one factor that can be used to carry out prime numbers is a long time to do the factoring. Data that is encrypted with the RSA algorithm must be changed to universal code, namely ASCII (American Standard Code for Information Interchange) or the American Standard Code for nformation exchange are the International Standard in universal letters and symbol codes. Based on the Basic Tri Dharma of Higher Education, measurement of lecturer performance needs to be carried out in accordance with their original objectives. Data can be obtained from each lecturer up to date with good data security.

References

Chen, C., Wang, T., Kou, Y., Chen, X., & Li, X. (2013). Improvement of trace-driven I-Cache timing attack on

the RSA algorithm. Journal of Systems and Software, 86(1), 100-107.

Fikry, M. (2016). APLIKASI JAVA KRIPTOGRAFI MENGGUNAKAN ALGORITMA VIGENERE. TECHSI-Jurnal Teknik Informatika, 8(1).

Fikry, M., Dinata, R. K (2016). Desain Web Dengan HTML dan CSS. Unimal Press.

Hsiao, F. H. (2018). Chaotic synchronization cryptosystems combined with RSA encryptio algorithm. Fuzzy Sets and Systems, 342, 109-137.

Listiyono, H. (2009). Implementasi Algoritma kunci public pada algoritma RSA. Jurnal Dinamika Informatika, 1(2).

Lin, X. J., Sun, L., & Qu, H. (2018). An efficient RSA- based certificateless public key encryption scheme. Discrete

applied Mathematics, 241, 39-47.

Nomor, P. P. R. I. (46). Tahun 2011 tentang Penilaian Prestasi Kerja Pegawai Negeri Sipil. Peraturan Kepala Badan Kepegawaian Negara Nomor, 1.

Padmaja, C. J., Srinivas, B., & Bhagavan, V. (2018). On The Usage Of Aryabhatta Remainder Theorem For Improved Performance Of Rprime Rsa. Journal of Theoretical & Applied Information Technology, 96(9)

Downloads

Published

2018-12-31

Most read articles by the same author(s)