RSA algorithm was discovered since 1977 and is still used until the present era. RSA algorithm has a very slow performance when compared with symmetric cryptography algorithm so a lot of research done to improve perfomanya. The main purpose of RSA algorithm is user security. RSA algorithm has many security holes for example, known plain text attack and wiener attack. This study analyzed the comparison of performance between standard RSA algorithm and RSA improvised algorithm implemented on java based TCP sockets and also analyzed security comparison of standard RSA algorithm and RSA algorithm improvement with known plain text attack and wiener attack method. The number of primes used in RSA improvisation algorithms varies from 2 to 6 primes...
The RSA algorithm is one of the cryptographic algorithms with an asymmetric model where the algorith...
The Internet is a powerful tool in today's ever-growing society. Computer Information and Internet ...
In this study the authors use Cryptographic Algorithms Rivest Shamir Adleman Chinese Remainder Theor...
This study aims to analyze the performance and security of the RSA algorithm in combination with the...
Socket TCP adalah abstraksi yang digunakan aplikasi untuk mengirim dan menerima data melalui koneksi...
Cryptography is the science or art of securing messages and is done by a cryptographer. The guarante...
The RSA algorithm has a very slow performance compared to other symmetric symmetric algorithms, the ...
Cryptography adalah suatu ilmu ataupun seni mengamankan pesan, dan dilakukan oleh cryptographer. dat...
Abstract - Along with the development of communication technology human needs in the use of technolo...
Socket TCP adalah abstraksi yang digunakan aplikasi untuk mengirim dan menerima data melalui koneksi...
In the world of Internet nothing is really safe. There's always a gap in any application made. Likew...
The development of technology and network systems experience a significant increase, especially in t...
This study aims to analyze security rsa algorithm standard by means of the key factor public n uses ...
Kriptografi adalah ilmu dan seni untuk menjaga keamanan pesan. Algoritma kriptografi yang populer sa...
Perkembangan Teknologi Informasi telah menyebabkan perubahan dan cara pandang hidup manusia maupun s...
The RSA algorithm is one of the cryptographic algorithms with an asymmetric model where the algorith...
The Internet is a powerful tool in today's ever-growing society. Computer Information and Internet ...
In this study the authors use Cryptographic Algorithms Rivest Shamir Adleman Chinese Remainder Theor...
This study aims to analyze the performance and security of the RSA algorithm in combination with the...
Socket TCP adalah abstraksi yang digunakan aplikasi untuk mengirim dan menerima data melalui koneksi...
Cryptography is the science or art of securing messages and is done by a cryptographer. The guarante...
The RSA algorithm has a very slow performance compared to other symmetric symmetric algorithms, the ...
Cryptography adalah suatu ilmu ataupun seni mengamankan pesan, dan dilakukan oleh cryptographer. dat...
Abstract - Along with the development of communication technology human needs in the use of technolo...
Socket TCP adalah abstraksi yang digunakan aplikasi untuk mengirim dan menerima data melalui koneksi...
In the world of Internet nothing is really safe. There's always a gap in any application made. Likew...
The development of technology and network systems experience a significant increase, especially in t...
This study aims to analyze security rsa algorithm standard by means of the key factor public n uses ...
Kriptografi adalah ilmu dan seni untuk menjaga keamanan pesan. Algoritma kriptografi yang populer sa...
Perkembangan Teknologi Informasi telah menyebabkan perubahan dan cara pandang hidup manusia maupun s...
The RSA algorithm is one of the cryptographic algorithms with an asymmetric model where the algorith...
The Internet is a powerful tool in today's ever-growing society. Computer Information and Internet ...
In this study the authors use Cryptographic Algorithms Rivest Shamir Adleman Chinese Remainder Theor...