Study on Computer Applications of Number Theory in Cryptography
Abstract
Technology has transformed the way we access and store information, making data retrieval fast and efficient. However, safeguarding this information is critical to prevent unauthorized access. Cryptography, rooted in number theory, plays a vital role in data protection by enabling encryption and decryption processes. This study aims to explore various cryptographic algorithms, examining their mechanisms and effectiveness in securing data. Through a comprehensive review of literature from books, journals, and other sources, this research will provide insights into the strengths and weaknesses of different cryptographic methods. The findings will contribute to enhancing data security practices in the digital age.
References
[2] Prayitno and N. Nurdin, “Analisa dan Implementasi Kriptografi pada Pesan Rahasia,” J. Elektron. Sist. Inf. dan Komput., vol. 3, no. 1, pp. 1–11, 2017. [Online]. Available: nnurdin69@gmail.com.
[3] “AES - Advanced Encryption Standard,” Study Informatics, Jul. 2012. [Online]. Available: http://studyinformatics.blogspot.com/2012/07/aes-advanced-encryption-standard.html. Accessed: Dec. 12, 2022.
[4] “Algoritma RSA,” KomputerKata, 2012. [Online]. Available: https://komputerkata.com/algoritma-rsa/. Accessed: Dec. 12, 2022.
[5] D. Ariyus, Kriptografi: Keamanan Data dan Komunikasi. Yogyakarta: Graha Ilmu, 2006.
[6] I. M. A. Arrijal, R. Efendi, and B. Susilo, “Penerapan Algoritma Kriptografi Kunci Simetris dengan Modifikasi Vigenere Cipher dalam Aplikasi Kriptografi Teks,” J. Pseudocode, vol. 3, no. 1, pp. 69–82, 2016. [Online]. Available: https://doi.org/10.33369/pseudocode.3.1.69-82.
[7] B. S. Hasugian, “Peranan Kriptografi Sebagai Keamanan Sistem Informasi pada Usaha Kecil dan Menengah,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, 2019. [Online]. Available: https://doi.org/10.46576/wdw.v0i53.269.
[8] E. Endaryono, N. Dwitiyanti, and H. S. Setiawan, “Aplikasi Operasi Matriks pada Perancangan Simulasi Metode Hill Cipher Menggunakan Microsoft Excel,” STRING, vol. 6, no. 1, pp. 1–9, Aug. 2021. [Online]. Available: http://dx.doi.org/10.30998/string.v6i1.8603.
[9] A. M. T., B. Konseling, F. I. Pendidikan, and U. N. Surabaya, “Studi Kepustakaan Mengenai Landasan Teori dan Praktik Konseling Expressive Writing,” J. BK UNESA, vol. 8, pp. 1–8, 2018. [Online]. Available: https://ejournal.unesa.ac.id/index.php/jurnal-bk-unesa/article/view/22037.
[10] “What is Cryptography: Types, Tools and Its Algorithms,” Elprocus. [Online]. Available: https://www.elprocus.com/cryptography-and-its-concepts/. Accessed: Dec. 11, 2022.
[11] “What Is Encryption?,” Cisco. [Online]. Available: https://www.cisco.com/c/en/us/products/security/encryption-explained.html. Accessed: Dec. 11, 2022.
[12] W. Widaya, Modul Penyusunan Soal Keterampilan Berpikir Tingkat Tinggi (Higher Order Thinking Skills) Matematika. Jakarta: Direktorat Pembinaan Sekolah Menengah Atas, 2018.