Claim Missing Document
Check
Articles

Found 1 Documents
Search

E-Surveillance System Security Using RSA-AES Algorithm (Rivest Shamir Adleman - Advanced Encryption Standard) Hajra Rasmita Ngemba; Aimar Anand; Syaiful Hendra; Anita Ahmad Kasim; Elyana Aulia Chandra
Tadulako Science and Technology Journal Vol. 5 No. 1 (2024): Tadulako Science and Technology Journal
Publisher : LPPM Universitas Tadulako

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22487/sciencetech.v5i1.17175

Abstract

Introduction: The Regional Inspectorate of Central Sulawesi Province has the task of supervising and fostering the implementation of government such as conducting audits, evaluations, reviews, and monitoring. The Regional Inspectorate of Central Sulawesi Province built a system for fostering Regional Apparatus Organizations called the E- E-Monitoring system. However, the files uploaded by the Regional Device Organization have not been encrypted in this system, so this study aims to use the RSA-AES algorithm in the E-Pengawasan system to increase system security. Method: The process that occurs in the RSA-AES algorithm is that the RSA key is used to encrypt the AES key and the AES key is used to encrypt and decrypt the file. Results and Discussion: The test results used are the black box testing method and also usability testing. Black box testing is used to test whether the functions on the system are running smoothly or not and usability testing is used to test efficiency in encryption and decryption based on file size. Conclusion: Based on the tests carried out, it was found that the amount of time used to encrypt files with a file size of 1MB - 50MB was 0.182 - 0.393 seconds. The test results for decryption were found with a file size of 1MB - 50MB, namely 0.050 - 0.148 seconds.