OPTIMASI VALIDASI UJI PRIMA MILLER–RABIN PADA PEMBANGKITAN KUNCI ALGORITMA ELGAMAL PADA KEAMANAN CITRA
Main Article Content
Abstract
Digital image security is an important aspect of modern information systems, especially in the storage and transmission of multimedia data. One widely used approach is public key cryptography, such as the ElGamal algorithm. ElGamal security is highly dependent on the selection of large prime numbers in the key generation process. Therefore, an efficient and accurate primality testing method is needed. This study proposes an optimization of the Miller–Rabin primality test validation in ElGamal algorithm key generation to improve the efficiency and security of image encryption. The optimization is performed by determining the optimal number of iterations and combining it with an initial deterministic test. The test results show that this optimization is able to speed up key generation time without reducing the level of security, and produces good image encryption quality based on histogram analysis and pixel correlation values.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
[1] H. Bustami, A. Fauzi, and H. Khair, “Computing ( JETCom ) KEY SECURITY INTEGRATION IN THE AES ALGORITHM USING THE LUC ALGORITHM ON Journal of Engineering , Technology and Computing ( JETCom ),” vol. 4, no. November, pp. 18–28, 2025.
[2] “View of Perancangan Kunci Public RSA dan ElGamal pada Kriptografi untuk Kemananan Informasi.” Accessed: Jan. 17, 2026. [Online]. Available: https://ojs.uma.ac.id/index.php/jite/article/view/1429/1418
[3] K. T. Nguyen, “a Public Key Encryption - Authentication Scheme Based on Elgamal Cryptographic Algorithm,” J. Sci. Tech., vol. 12, no. 01, pp. 73–82, 2023, doi: 10.56651/lqdtu.jst.v12.n1.658.ict.
[4] Rio Andika, Rizky Fajar Sitepu, Putri Ramadhani, Rizka Nova Fitria, and Achmad Fauzi, “Penerapan Super Enkripsi Algoritma Autokey Cipher dan El-Gamal File Gambar,” J. Sist. Inf. Kaputama, vol. 9, no. 1, pp. 45–54, 2025, doi: 10.59697/jsik.v9i1.957.
[5] A. Y. N. Harahap, H. Gunawan, A. B. Nst, and R. E. Sari, “Penerapan Elgamal Guna Meningkatkan Keamanan Data Text Dan Docx,” It (Informatic Tech. J., vol. 10, no. 1, p. 76, 2022, doi: 10.22303/it.10.1.2022.76-86.
[6] S. T. Ishmukhametov, B. G. Mubarakov, and R. G. Rubtsova, “On the number of witnesses in the miller-rabin primality test,” Symmetry (Basel)., vol. 12, no. 6, pp. 1–12, 2020, doi: 10.3390/SYM12060890.
[7] A. D. Hidayat and I. Afrianto, “Sistem Kriptografi Citra Digital Pada Jaringan Intranet Menggunakan Metode Kombinasi Chaos Map Dan Teknik Selektif,” vol. IX, no. 1, pp. 59–66, 2017.