Implementasi Algoritma Rivest Shamir Adleman Untuk Keamanan Pesan Teks
Abstract
Security is a set of procedures, steps, and policies to prevent and monitor unauthorized access, problem solving, disclosure, and disruption of computer data communication. Data or message security can be achieved using cryptography. Cryptography is an important component for communication and information transmission through security services. Cryptography is both an art and a science that produces secret messages. One cryptographic method that can be utilized is RSA method. RSA is an asymmetric cryptographic method that operates in block mode and requires two different keys for the encryption and decryption processes. The advantage of this algorithm is that its difficulty lies in factoring non-prime numbers into their prime factors. The results of the tests conducted show that RSA algorithm can provide additional security for files by using different keys during the encryption and decryption processes. This is because the text data owned by the user will be encrypted and replaced with a series of numbers that do not represent the content of the original data.
Downloads
References
[2] Andhika, D. I., Muharrom, M., Prayitno, E., & Siregar, J. (2022). Rancang Bangun Sistem Penerimaan Dokumen Pada PT. Reasuransi Indonesia Utama. JITEK (Jurnal Informatika dan Teknologi Komputer), 136-145.
[3] Arianti, T., Fa’izi, A., Adam, S., & Wulandari, M. (2022). Perancangan Sistem Informasi Perpustakaan Menggunakan Diagram UML (Unified Modelling Language). Jurnal Ilmiah Komputer Terapan dan Informasi (JIKTI), 19-25.
[4] Ayumida, S., Azis, M. S., & Fiano, Z. G. (2020). Implementasi Program Administrasi Pembayaran Berbasis Dekstop (Studi Kasus: SMA Negeri 1 Cikampek). Jurnal Interkom: Jurnal Publikasi Ilmiah Bidang Teknologi Informasi dan Komunikasi, 72-83.
[5] Dairi, M., Asih, M. S., & Khairunnisa. (2023). Implementasi Algoritma Kriptografi RSA Dalam Aplikasi Sistem Informasi Perpustakaaan. Jurnal Ilmu Komputer dan Sistem Informasi (JIRSI) , 214-223.
[6] Firmansyah, R., & Permana, A. A. (2019). Implementasi Keamanan Pesan Teks Menggunakan Kriptografi Algoritma RSA Dengan Metode Waterfall Berbasis Java. JOUTICA , 217-221.
[7] Gunawan, & Kirman. (2019). Implementasi Algoritma Turbo Boyer Moore Untuk Pencarian Data Pada Transaksi Keuangan Duta Phonecell Sawah Lebar. Jurnal Media Infotama, 9-15.
[8] Limantoro, R. R., & Kristiadi, D. P. (2021). Pengembangan Sistem Informasi Pendataan Green Folder Menggunakan Metode Berorientasi Objek Dan UML Berbasis Web Pada TKHarvest Christian School. JURNAL SISTEM INFORMASI DAN TEKNOLOG (SINTEK), 7-14.
[9] Muafi, Wijaya, A., & Aziz, V. A. (2020). Sistem Pakar Mendiagnosa Penyakit Mata Pada Anusia Menggunakan Metode Forward Chaining. Jurnal Komputasi dan Teknologi Informasi, 43-49.
[10] R.H Sianipar. (2019). Visual Basic.Net Untuk Programmer. Yogyakarta: Andi Offset.
[11] Ridho, A., Mutia, C., & Sinaga, A. P. (2022). Analisis Enkripsi Dan Dekripsi Cipher Teks Menggunakan Kombinasi Gronsfeld Cipher Dengan Reverse Cipher. JTIK (Jurnal Teknik Informatika Kaputam), 87-94.
[12] Sasono, D. M., Tahir, M., Angel M, F., Azizah, M., Utami, L. F., & Septiana, N. (2023). Perbandingan Kriptography Klasik Caesar Cipher Dengan Kriptography Modern Aes Dalam Tingkat Keamanan Jaringan Kompute. Jurnal Informasi, Sains dan Teknologi, 72-77.
[13] Sutrisno, J., & Karnadi, V. (2021). Aplikasi Pendukung Pembelajaran Bahasa Inggris Menggunakan Media Lagu Berbasis Android. JURNAL COMASIE, 31-41.
[14] Wahidin, U., Sarbini, M., Maulida, A., & Wangsadanureja, M. (2021). Implementasi Pembelajaran Agama Islam Berbasis Multimedia Di Pondok Pesantren. Edukasi Islami: Jurnal Pendidikan Islam, 21-32.
[15] Wahyudi, Hartama, D., Kirana, I. O., Sumarno, & Gunawan, I. (2022). Implementasi Algoritma Kriptografi Rivest Shamir Adlemen untuk Mengamankan Data Ijazah pada SMK Swasta Prama Artha Kab. Simalungun. Jurnal Ilmu Komputer dan Informatika (JIKI), 57-66.
[16] Yusrizal. (2019). Rancang Bangun Aplikasi Kriptografi Pada Teks Menggunakan Metode Reverse Chiper Dan Rsa Berbasis Android. JTIK (Jurnal Teknik Informatika Kaputama), 29-37.
[17] Zachary, M. Z., Sylviani, S., & Kurniadi, E. (2024). Implementasi Algoritma RSA (Rivest-Shamir-Adleman) Pada Kriptografi Klasik. Mathematical Sciences and Applications Journal, 54-59.
[18] Ziliwu, K., Maslan, A., & Kremer, H. (2022). Implementasi Caesar Cipher Pada Algoritma Kriptografi Dalam Penyandian Pesan Whatsapp. Jurnal Comasie, 117-125.
Copyright (c) 2025 Haggy Sandy Prayogy, Indra Kanedi; Devi Sartika

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
An author who publishes in Jurnal Media Infotama agrees to the following terms:The author holds the copyright and grants the journal the right of first publication of the work simultaneously licensed under the Creative Commons Attribution-Share Alike 4.0 License which allows others to share the work with acknowledgment of the work's authorship and initial publication in this journal.Submission of a manuscript implies that the submitted work has not been previously published (except as part of a thesis or report, or abstract); that it is not being considered for publication elsewhere; that its publication has been approved by all co-authors. If and when a manuscript is accepted for publication, the author retains the copyright and retains the publishing rights without limitation.
For new inventions, authors are advised to administer the patent before publication. The license type is CC-BY-SA 4.0.
MEDIA INFORMATION REVIEW: Journal of the Faculty of Computer Science is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.You are free to:Share
— copy and redistribute material in any medium or formatAdapt
— remix, modify and develop materialfor any purpose, even commercial.
The licensor cannot revoke this freedom as long as you follow the license terms