Application of Number Theory in Cryptography

https://doi.org/10.55299/ijere.v3i1.733

Authors

  • Andreas Perdamenta Peranginangin Universitas Prima Indonesia

Keywords:

cryptography, theory, application

Abstract

Life has changed in this era of technology. With technology, information can be searched easily and quickly, starting from the difficulty of finding information. Besides, people can easily store information in software or on the Internet. But you don't want this information to get out to anyone who doesn't want it. Therefore, data security is needed, which is applied using the science of cryptography, which uses material from number theory. This research will look at various cryptographic algorithms and processes for encrypting and decrypting data. This study uses library research or (library research). Library research involves gathering detailed information from numerous sources including literature, books, notes, journals, and other sources.

Downloads

Download data is not yet available.

References

A. Prayitno and N. Nurdin, “Analisa Dan Implementasi Kriptografi Pada Pesan

Rahasia,” J. Elektron. Sist. Inf. dan Komput., vol. 3, no. 1, pp. 1–11, 2017,

[Online]. Available: nnurdin69@gmail.com

AES -Advanced Encryption Standard-. http://studyinformatics.blogspot.com/2012/07/aes-advanced-encryption- standard.html. Diakses pada 12 Desember 2022

Algoritma RSA. https://komputerkata.com/algoritma-rsa/. Diakses pada 12 Desember 2022

Ariyus D, 2006. Kriptografi: Keamanan Data dan Komunikasi. Graha Ilmu.

Yogyakarta.

Arrijal, I. M. A., Efendi, R., & Susilo, B. (2016). Penerapan Algoritma Kriptografi Kunci

Simetris Dengan Modifikasi Vigenere Cipher Dalam Aplikasi Kriptografi Teks. Jurnal Pseudocode, 3(1), 69-82.). https://doi.org/10.33369/pseudocode.3.1.69-82

B. Solihin Hasugian, “Peranan Kriptografi Sebagai Keamanan Sistem Informasi Pada Usaha Kecil Dan Menengah,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, 2019, doi: https://doi.org/10.46576/wdw.v0i53.269.

Endaryono; Dwitiyanti, Nurfidah; Setiawan, Heri Satria. 2021. Aplikasi Operasi

Matriks pada Perancangan Simulasi Metode Hill Cipher Menggunakan

Microsft Excel. STRING, Vol.6 No.1 Agustus 2021. http://dx.doi.org/10.30998/string.v6i1.8603

F. Aryani and Yulianis, 2018, “Trace Matriks Berbentuk Khusus 2 x 2 Berpangkat Bilangan Bulat Negatif,” J. Sains Mat. dan Stat., vol. 4, no. 2, pp. 105–113. http://dx.doi.org/10.24014/jsms.v4i2.5474

Ginting, Dahlia Br. 2010. Peranan Aritmetika Modulo dan Bilangan Prima pada

Algoritma Kriptografi RSA. Media Informatika Vol.9 No.2 (2010).

Ibrahim. (2012). Pembelajaran Matematika dengan ICT Sebagai Sarana

Pengembangan Kecerdasan Emosional Siswa Menuju Pembangunan Karakter Bangsa. Jurnal Fourier, 1(2), 47–51. https://doi.org/10.14421/fourier.2012.12.47-51

Khabibah, 2001, “Suatu Alternatif Pembelajaran Matematika SD” Makalah disampaikan

dalam seminar Nasional PMRI Tanggal 21 November 2001.

Kriptografi #2 (Macam-macam Algoritma Kriptografi). http://gilang- kurniawan.blogspot.com/2012/05/kriptografi-2-macam-macam- algoritma.html. Diakses pada 10 Desember 2022

Lismareni, N., Somakim., Kesumawati, N. (2014). Pengembangan Bahan Ajar Materi Aritmetika Sosial Menggunakan Konteks Bahan Bakar Minyak Dengan Pendekatan Pendidikan Matematika Realistik Indonesia Di SMP. Jurnal Pendidikan Matematika UNSRI, 1, 1–12. http://dx.doi.org/10.22342/jpm.9.1.2186.48%20-%2058

Munir, Rinaldi, 2020. “Teori Bilangan (Bagian 1)”. https://informatika.stei.itb.ac.id/~rinaldi.munir/Matdis/2020-2021/Teori-Bilangan-2020-Bagian1.pdf. Diakses 08 Desember 2022

Munir, Rinaldi, 2020. “Teori Bilangan (Bagian 3)”. https://informatika.stei.itb.ac.id/~rinaldi.munir/Matdis/2020-2021/Teori-Bilangan-2020-Bagian3.pdf. Diakses 08 Desember 2022

Musrikah. 2016. Model Pembelajaran Matematika Realistik Sebagai Optimalisasi

Kecerdasan Logika Matematika pada Siswa SD/MI. TA'ALLUM, Vol.04.,

No.01, Juni 2016.

Puspita, K., &Wayahdi, M. R. (2015, February). Analisis Kombinasi Metode Caesar Cipher, Vernam Cipher, Dan Hill Cipher Dalam Proses Kriptografi. In Jurnal Seminar Nasional Teknologi Informasidan Multimedia).

Rebu, Marselinus Junardi. 2015. Kriptografi Klasik. Yogyakarta: Universitas Sanata Dharma

Schneier B, 1996. Applied Cryptography: Protocols, Algorithms and Source Code in C 2nd Ed. John Wiley & Sons, Inc. New Jersey.

T, A. M., Konseling, B., Pendidikan, F. I., & Surabaya, U. N. (2018). Studi

Kepustakaan Mengenai Landasan Teori Dan Praktik Konseling Expressive

Writing. Jurnal BK UNESA, 8, 1–8. https://ejournal.unesa.ac.id/index.php/jurnal-bk-unesa/article/view/22037

What is Cryptography : Types, Tools and Its Algorithms. https://www.elprocus.com/cryptography-and-its-concepts/. Diakses pada 11 Desember 2022

What Is Encryption?. https://www.cisco.com/c/en/us/products/security/encryption- explained.html. Diakses pada 11 Desember 2022

Widaya, Wayan. 2018. Modul Penyusunan Soal Keterampilan Berpikir Tingkat Tinggi (Higher Order Thingking Skills) Matematika. Jakarta: Direktorat Pembinaan Sekolah Menengah Atas.

Yanti, Ili. 2022. Analisis Kemampuan Literasi Matematika Siswa dalam

Menyelesaikan Soal Higher Order Thingking Skill (HOTS) pada Materi

Matriks di Sekolah Menengah Atas Al-Azhar Jambi. Skripsi UIN Sulthan Thaha Saifuddin Jambi. Dipublikasikan. http://dx.doi.org/10.24127/ajpm.v11i3.5442

Published

2024-01-15

How to Cite

Peranginangin, A. P. (2024). Application of Number Theory in Cryptography. International Journal of Educational Research Excellence (IJERE), 3(1), 67–76. https://doi.org/10.55299/ijere.v3i1.733