Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security

There are many ways to ensure data security, one of the classic way but still effective is to use encryption. Encryption itself has two techniques or algorithms: symmetric-key (also called secret-key) and asymmetric-key encryption (also called public key). In this paper, we proposed an analysis of t...

Full description

Saved in:
Bibliographic Details
Published inEdu Komputika Journal Vol. 9; no. 1; pp. 60 - 67
Main Authors Sholikhatin, Siti Alvi, Kuncoro, Adam Prayogo, Munawaroh, Afifah Lutfia, Setiawan, Gilang Aji
Format Journal Article
LanguageEnglish
Published 30.06.2022
Online AccessGet full text
ISSN2252-6811
2599-297X
2599-297X
DOI10.15294/edukomputika.v9i1.57389

Cover

More Information
Summary:There are many ways to ensure data security, one of the classic way but still effective is to use encryption. Encryption itself has two techniques or algorithms: symmetric-key (also called secret-key) and asymmetric-key encryption (also called public key). In this paper, we proposed an analysis of two algorithm of encryption: RSA and AES algorithm in term of securing digital data. The method used in this research are: RSA and AES analysis, then retrieving the result. The two algorithm is deeply and thoroughly analyzed to discover the effectiveness to secure the data. The Technological Readiness Level (TKT) is at level 6, which means demonstration of a model or prototype or the analysis result of a system or subsystem or a study in a relevant environment. The result concluded that the application of the AES encryption algorithm is more optimal than RSA encryption in digital data security. Because the encryption and decryption process of using the AES algorithm is faster, although the difference in testing time of the two encryption algorithms is not too significant. The entropy value of 4.96 in AES encryption is greater than that of RSA proving that the even distribution of characters in the chiper text code does not accumulate on certain characters so that it will be difficult to attack using frequency analysis.
ISSN:2252-6811
2599-297X
2599-297X
DOI:10.15294/edukomputika.v9i1.57389