Implementasi Algoritma RSA (Rivest Shamir Adleman) Dalam Pengaman File Video

 (*)Juliana Tamba Mail (Universitas Budi Darma, Medan, Indonesia)

(*) Corresponding Author

Abstract

The problem with the video scope is that private videos can be watched by unauthorized people if the video file is unsecured. If there is a break-in and information theft of an important data in a video file, it will be detrimental to interested parties. Therefore, an application system is needed to be able to secure the video file. To minimize this, a second level of security is needed, namely by scrambling the video so that the visual information from the video cannot be seen by people who do not have a key. Then the information in the video file is changed in the form of a code or signal where this code will be manipulated. Thus the author feels that video files need to be secured with good security. So it is necessary to encrypt and decrypt video files. The RSA algorithm is one of the cryptographic algorithms that can be used to secure video files. The RSA algorithm is an algorithm that performs factoring of 2 large prime numbers. The RSA scheme adopts the block cipher scheme, before encryption, the plaintext and ciphertext are integers between 1 to n. Where n is usually 1024 bits in size, and the block length itself is smaller or log(n)+1 with base 2. The RSA algorithm also generates a code, by constructing public and private key generators. This study describes how to secure video files based on the RSA algorithm.

Keywords


Cryptography; RSA Algorithm; File; Video; Security

Full Text:

PDF


Article Metrics

Abstract view : 68 times
PDF - 21 times

References

F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Inform. Mulawarman J. Ilm. Ilmu Komput., vol. 10, no. 1, p. 20, 2016, doi: 10.30872/jim.v10i1.23.

R. N. Nasution and B. Triandi, “Implementasi Metode Rsa Dan Aes Untuk Mengamankan File Winrar Dan Zip,” It (Informatic Tech. J., vol. 8, no. 1, p. 42, 2021, doi: 10.22303/it.8.1.2020.42-53.

M. Y. Simargolang, “Implementasi Kriptografi Rsa Dengan Php,” J. Teknol. Inf., vol. 1, no. 1, p. 1, 2017, doi: 10.36294/jurti.v1i1.1.

E. Suheri, “UNIVERSITAS SUMATERA UTARA Poliklinik UNIVERSITAS SUMATERA UTARA,” J. Pembang. Wil. Kota, vol. 1, no. 3, pp. 82–91, 2012.

A. P. Retno, “Implementasi Algoritma RSA Dalam Pengamanan File JPG,” pp. 7–37, 2017.

M. R. Rambe, E. V. Haryanto, and A. Setiawan, “Aplikasi Pengamanan Data Dan Disisipkan Pada Gambar Dengan Algoritma Rsa Dan Modified Lsb Berbasis Android,” It (Informatic Tech. J., vol. 7, no. 1, p. 51, 2019, doi: 10.22303/it.7.1.2019.51-62.

M. A. I. Windarto, “JURNAL KILAT VOL. 6NO. 1, APRIL2017| 43IMPLEMENTASI ALGORTIMA KRIPTOGRAFI RSA, KOMPRESI DATA HUFFMAN, DAN STEGANOGRAFI EOF PADA MEDIA VIDEO UNTUK KEAMANAN DATA DI PT SELARAS CITANUSA WISATA,” J. Kilat, vol. vol 6 No 1, 2017.

S. Indra Gunawan, “Penggunaan Algoritma Kriptografi Steganografi Least Significant Bit Untuk Pengamanan Pesan Teks dan Data Video,” J. Sains Komput. Inform., vol. Volum 2 No.

A. Malvi and Painem, “Pengamanan File Gambar pada Media Video dengan Kriptografi Algoritma RSA dan Steganografi Algoritma End of File (EOF),” in JURNAL INFORMATIK, Ke 16 No 2., 2020.

M. . primananda Arif Aditya, S.Si, “Dasar-Dasar pemograman Database Dekstop dengan Visual Basic.Net 2008,” in Dasar-Dasar pemograman Database Dekstop dengan Visual Basic.Net 2008, 2013, pp. 2–10.

D. P. Pahrizal, “Implementasi Algoritma Rsa Untuk Pengamanan Data Berbentuk Teks,” J. Pseudocode, vol. III, no. 1, p. ISSN : 2355 – 5920, 2013.

K. D. Wandani and S. Sinurat, “Implementasi Secure Hash Algoritma untuk pengamanan pada file video,” Inf. dan Teknol. Ilm., vol. 13, pp. 165–168, 2018.

M. Kom, K. Lpm, S. Kom, B. Gunawan, and S. Kom, “Jurnal Teknologi Komunikasi,” Teknol. Komun., vol. 1, no. 3, pp. 44–55, 2013.

I. Y. Kurniawan, “kriptografi keamanan internet dan jaringan komunikasi,” Inform. Bandung, 2004.

H. Mukhtar, Kriptografi untuk keamanan data. Yogyakarta, 2018.

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Algoritma RSA (Rivest Shamir Adleman) Dalam Pengaman File Video

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Juliana Tamba

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


Jurnal INFORMASI DAN TEKNOLOGI ILMIAH (INTI)
P3M STMIK Budi Darma
Sekretariat : Jln. Sisingamangaraja No. 338 
Email : ejurnal.stmikbudidarma@gmail.com

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License