Study on Computer Applications of Number Theory in Cryptography

Authors

  • Rahul Das Department of Science, Technology and Engineering, Rajarshi Janak University Janakpurdham, Nepal
  • Ashok Kumar Mahato Department of Science, Technology and Engineering, Rajarshi Janak University Janakpurdham, Nepal
  • Suresh Kumar Sahani Department of Science, Technology and Engineering, Rajarshi Janak University Janakpurdham, Nepal

Keywords:

Cryptography, Data Security, Encryption, Decryption, Cryptographic Algorithms

Abstract

Technology has transformed the way we access and store information, making data retrieval fast and efficient. However, safeguarding this information is critical to prevent unauthorized access. Cryptography, rooted in number theory, plays a vital role in data protection by enabling encryption and decryption processes. This study aims to explore various cryptographic algorithms, examining their mechanisms and effectiveness in securing data. Through a comprehensive review of literature from books, journals, and other sources, this research will provide insights into the strengths and weaknesses of different cryptographic methods. The findings will contribute to enhancing data security practices in the digital age.

References

[1] [Online]. “ElGamal Encryption Algorithm,” GeeksforGeeks. Available: https://www.geeksforgeeks.org/elgamal-encryption-algorithm/. Accessed: Dec. 12, 2022.
[2] Prayitno and N. Nurdin, “Analisa dan Implementasi Kriptografi pada Pesan Rahasia,” J. Elektron. Sist. Inf. dan Komput., vol. 3, no. 1, pp. 1–11, 2017. [Online]. Available: nnurdin69@gmail.com.
[3] “AES - Advanced Encryption Standard,” Study Informatics, Jul. 2012. [Online]. Available: http://studyinformatics.blogspot.com/2012/07/aes-advanced-encryption-standard.html. Accessed: Dec. 12, 2022.
[4] “Algoritma RSA,” KomputerKata, 2012. [Online]. Available: https://komputerkata.com/algoritma-rsa/. Accessed: Dec. 12, 2022.
[5] D. Ariyus, Kriptografi: Keamanan Data dan Komunikasi. Yogyakarta: Graha Ilmu, 2006.
[6] I. M. A. Arrijal, R. Efendi, and B. Susilo, “Penerapan Algoritma Kriptografi Kunci Simetris dengan Modifikasi Vigenere Cipher dalam Aplikasi Kriptografi Teks,” J. Pseudocode, vol. 3, no. 1, pp. 69–82, 2016. [Online]. Available: https://doi.org/10.33369/pseudocode.3.1.69-82.
[7] B. S. Hasugian, “Peranan Kriptografi Sebagai Keamanan Sistem Informasi pada Usaha Kecil dan Menengah,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, 2019. [Online]. Available: https://doi.org/10.46576/wdw.v0i53.269.
[8] E. Endaryono, N. Dwitiyanti, and H. S. Setiawan, “Aplikasi Operasi Matriks pada Perancangan Simulasi Metode Hill Cipher Menggunakan Microsoft Excel,” STRING, vol. 6, no. 1, pp. 1–9, Aug. 2021. [Online]. Available: http://dx.doi.org/10.30998/string.v6i1.8603.
[9] A. M. T., B. Konseling, F. I. Pendidikan, and U. N. Surabaya, “Studi Kepustakaan Mengenai Landasan Teori dan Praktik Konseling Expressive Writing,” J. BK UNESA, vol. 8, pp. 1–8, 2018. [Online]. Available: https://ejournal.unesa.ac.id/index.php/jurnal-bk-unesa/article/view/22037.
[10] “What is Cryptography: Types, Tools and Its Algorithms,” Elprocus. [Online]. Available: https://www.elprocus.com/cryptography-and-its-concepts/. Accessed: Dec. 11, 2022.
[11] “What Is Encryption?,” Cisco. [Online]. Available: https://www.cisco.com/c/en/us/products/security/encryption-explained.html. Accessed: Dec. 11, 2022.
[12] W. Widaya, Modul Penyusunan Soal Keterampilan Berpikir Tingkat Tinggi (Higher Order Thinking Skills) Matematika. Jakarta: Direktorat Pembinaan Sekolah Menengah Atas, 2018.

Downloads

Published

2024-09-10

How to Cite

Das, R. ., Mahato, A. K. ., & Sahani, S. K. . (2024). Study on Computer Applications of Number Theory in Cryptography. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 5(3), 320–328. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/663

Issue

Section

Articles