PERBANDINGAN TEKNIK ALGORITMA RSA DENGAN ALGORITMA ELGAMAL DALAM MENINGKATKAN  NILAI ENTROPY DALAM CHIPERTEXT

Main Article Content

Tengku Didi Ferdillah
Achmad Fauzi

Abstract

This research examines the entropy values of the RSA and ElGamal algorithms in the context of cryptographic data security. Both algorithms are widely used asymmetric encryption methods in various information security applications. Entropy is utilized to measure the level of randomness and uncertainty in the encrypted data, which correlates to the system's security level. The research analyzes the output of both algorithms using the same input data and various cryptographic key sizes. This study provides in-depth insights into the performance of RSA and ElGamal algorithms from the perspective of entropy, aiding in the selection of the appropriate algorithm based on specific application needs.

Article Details

Section
Articles

References

[1] R. I. H. Nasution, Achmad Fauzi, and Husnul Khair, “Hybrid Cryptosystem Algorithm Vigenere Cipher and Base64 for Text Message Security Utilizing Least Significant Bit (LSB) Steganography as Insert into Image,” J. Artif. Intell. Eng. Appl., vol. 2, no. 3, pp. 89–98, 2023, doi: 10.59934/jaiea.v2i3.201.

[2] A. Fauzi, “Analisis Hybrid Cryptosystem Algoritma Elgamal dan Algoritma Triple Des,” 2014.

[3] T. B. Surbakti, A. Fauzi, and H. Khair, “Rivest Shamir Adleman (RSA) Hybrid Algorithm System and the deep Blum Blum Shub (BBS) Algorithm Securing E-Absence Database Files,” Indones. J. Educ. Comput. Sci., vol. 1, no. 2, pp. 53–61, 2023, doi: 10.60076/indotech.v1i2.59.

[4] H. K. Rani Rianda Br Ginting, Achmad Fauzi, “Penerapan Algoritma RSA Dan AES Dalam Pengamanan Data Tunggakan Tagihan PDAM Kota Binjai | Bulletin of Multi-Disciplinary Science and Applied Technology.” Accessed: Mar. 27, 2025. [Online]. Available: https://ejurnal.seminar-id.com/index.php/bimasati/article/view/2476

[5] Listiyono, “Implementasi Algoritma Kunci Public Pada Algoritma Rsa,” J. Din. Inform., vol. 1, no. 2, pp. 95–99, 2009.

[6] A. H. Hasugian, R. A. Putri, and A. S. Zuhri, “Penerapan Metode Elgamal Untuk Mengamankan Teks Pada File Dokumen Word,” KLIK Kaji. Ilm. Inform. dan Komput., vol. 4, no. 2, pp. 1143–1153, 2023, doi: 10.30865/klik.v4i2.1277.

[7] R. Solin and P. Ramadhani, “Modifikasi Pembangkit Kunci Algoritma Elgamal Dengan Menerapkan Algoritma Freivalds,” KOMIK (Konferensi Nas. …, vol. 4, pp. 351–356, 2020, doi: 10.30865/komik.v4i1.2719.

[8] M. S. Dairi, M. Setiani Asih, and corespondent author, “Implementasi Algoritma Kriptografi RSA Dalam Aplikasi Sistem Informasi Perpustakaaan Implementation Of RSA Cryptographic Algorithms in Library Information System Applications,” Januari, vol. 2023, no. 2, pp. 214–223, 2022, [Online]. Available: https://jurnal.unity-academy.sch.id/index.php/jirsi/index%0Ahttp://creativecommons.org/licenses/by-sa/4.0/

[9] A. Khumaidi, “Simulasi Entropi Shannon, Entropi Renyi, dan informasi pada kasus Spin Wheel,” AKSIOMA J. Mat. dan Pendidik. Mat., vol. 12, no. 1, pp. 120–128, 2021, doi: 10.26877/aks.v12i1.6893.