Edi Kurniadi
Departemen Matematika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Padjadjaran, Sumedang 45363

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Implementasi Algoritma RSA (Rivest-Shamir-Adleman) pada Kriptografi Klasik Muhammad Zaky Zachary; Sisilia Sylviani; Edi Kurniadi
Mathematical Sciences and Applications Journal Vol. 4 No. 2 (2024): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v4i2.28863

Abstract

The implementation of the RSA (Rivest-Shamir-Adleman) cryptography algorithm, which is one of the most commonly used public-key cryptography algorithms. RSA provides high security and is widely used in information security applications such as data encryption, digital signature generation, and key exchange. This research documents the step-by-step implementation process of the RSA algorithm in classical cryptography, including key generation, data encryption, and decryption, leading to the generation of encryption and decryption tables for a specific key.
Pengamanan Nama Customer Shopee melalui Kombinasi Algoritma Hill Cipher Modifikasi dan Rail Fence Cipher Laily Wadil Muqadas; Sisilia Sylviani; Edi Kurniadi
Mathematical Sciences and Applications Journal Vol. 4 No. 2 (2024): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v4i2.28865

Abstract

Science and technology development has made human activities turn into cyberspace activities, one of which is buying and selling. Shopee is one of the e-commerce platforms available. As an online-based platform, Shopee certainly stores lots of user data. Since August 1st, 2022, Shopee has made a policy regarding user data security by censoring the buyer’s name and phone number in the ordering process. This research discusses one way to secure buyer data through cryptography with the concept of super encryption. This concept itself combines more than one encryption method with the goal to create ciphertext that is difficult to solve. The chosen combination for this research is the modified Hill Cipher algorithm before proceeding with the Rail Fence Cipher encryption. Result obtained in this research is possible to be applied in Shopee buyer data security system, seen from the difficulty level of the ciphertext decryption.