Study on Computer Applications of Number Theory in Cryptography

  • Rahul Das Department of Science, Technology and Engineering, Rajarshi Janak University Janakpurdham, Nepal
  • Ashok Kumar Mahato Department of Science, Technology and Engineering, Rajarshi Janak University Janakpurdham, Nepal
  • Suresh Kumar Sahani Department of Science, Technology and Engineering, Rajarshi Janak University Janakpurdham, Nepal
Keywords: Cryptography, Data Security, Encryption, Decryption, Cryptographic Algorithms

Abstract

Technology has transformed the way we access and store information, making data retrieval fast and efficient. However, safeguarding this information is critical to prevent unauthorized access. Cryptography, rooted in number theory, plays a vital role in data protection by enabling encryption and decryption processes. This study aims to explore various cryptographic algorithms, examining their mechanisms and effectiveness in securing data. Through a comprehensive review of literature from books, journals, and other sources, this research will provide insights into the strengths and weaknesses of different cryptographic methods. The findings will contribute to enhancing data security practices in the digital age.

References

[1] [Online]. “ElGamal Encryption Algorithm,” GeeksforGeeks. Available: https://www.geeksforgeeks.org/elgamal-encryption-algorithm/. Accessed: Dec. 12, 2022.
[2] Prayitno and N. Nurdin, “Analisa dan Implementasi Kriptografi pada Pesan Rahasia,” J. Elektron. Sist. Inf. dan Komput., vol. 3, no. 1, pp. 1–11, 2017. [Online]. Available: nnurdin69@gmail.com.
[3] “AES - Advanced Encryption Standard,” Study Informatics, Jul. 2012. [Online]. Available: http://studyinformatics.blogspot.com/2012/07/aes-advanced-encryption-standard.html. Accessed: Dec. 12, 2022.
[4] “Algoritma RSA,” KomputerKata, 2012. [Online]. Available: https://komputerkata.com/algoritma-rsa/. Accessed: Dec. 12, 2022.
[5] D. Ariyus, Kriptografi: Keamanan Data dan Komunikasi. Yogyakarta: Graha Ilmu, 2006.
[6] I. M. A. Arrijal, R. Efendi, and B. Susilo, “Penerapan Algoritma Kriptografi Kunci Simetris dengan Modifikasi Vigenere Cipher dalam Aplikasi Kriptografi Teks,” J. Pseudocode, vol. 3, no. 1, pp. 69–82, 2016. [Online]. Available: https://doi.org/10.33369/pseudocode.3.1.69-82.
[7] B. S. Hasugian, “Peranan Kriptografi Sebagai Keamanan Sistem Informasi pada Usaha Kecil dan Menengah,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, 2019. [Online]. Available: https://doi.org/10.46576/wdw.v0i53.269.
[8] E. Endaryono, N. Dwitiyanti, and H. S. Setiawan, “Aplikasi Operasi Matriks pada Perancangan Simulasi Metode Hill Cipher Menggunakan Microsoft Excel,” STRING, vol. 6, no. 1, pp. 1–9, Aug. 2021. [Online]. Available: http://dx.doi.org/10.30998/string.v6i1.8603.
[9] A. M. T., B. Konseling, F. I. Pendidikan, and U. N. Surabaya, “Studi Kepustakaan Mengenai Landasan Teori dan Praktik Konseling Expressive Writing,” J. BK UNESA, vol. 8, pp. 1–8, 2018. [Online]. Available: https://ejournal.unesa.ac.id/index.php/jurnal-bk-unesa/article/view/22037.
[10] “What is Cryptography: Types, Tools and Its Algorithms,” Elprocus. [Online]. Available: https://www.elprocus.com/cryptography-and-its-concepts/. Accessed: Dec. 11, 2022.
[11] “What Is Encryption?,” Cisco. [Online]. Available: https://www.cisco.com/c/en/us/products/security/encryption-explained.html. Accessed: Dec. 11, 2022.
[12] W. Widaya, Modul Penyusunan Soal Keterampilan Berpikir Tingkat Tinggi (Higher Order Thinking Skills) Matematika. Jakarta: Direktorat Pembinaan Sekolah Menengah Atas, 2018.
Published
2024-09-10
How to Cite
Das, R., Mahato, A. K., & Sahani, S. K. (2024). Study on Computer Applications of Number Theory in Cryptography. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 5(3), 320-328. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/663
Section
Articles