Program Studi Sistem Komputer, Universitas Diponegoro, Indonesia
BibTex Citation Data :
@article{JTSISKOM12009, author = {Albert Ginting and R. Rizal Isnanto and Ike Pertiwi Windasari}, title = {Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email}, journal = {Jurnal Teknologi dan Sistem Komputer}, volume = {3}, number = {2}, year = {2015}, keywords = {cryptographic; RSA; encryption; decryption; java}, abstract = {In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography. One fairly popular cryptographic algorithms are RSA algorithm. In this study will discuss the implementation of a cryptographic algorithm RSA encryption and decryption process email. To test created a java-based email client program with message encryption and decryption features messages. This application uses the Java programming language and Netbeans 7.4 as editor. Mail servers used is Google Mail. The initial step of this study was to download email from the Google server and encrypt the message. The second step is decrypt the message to verify whether the message is still the same as the original message before it is encrypted . Results from this study is the application that can encrypt and decrypt messages using RSA cryptographic algorithm. With this application is expected to mail delivery is much safer. Because encrypted email will generate a random decimal number of unknown value .}, issn = {2338-0403}, pages = {253--258} doi = {10.14710/jtsiskom.3.2.2015.253-258}, url = {https://jtsiskom.undip.ac.id/article/view/12009} }
Refworks Citation Data :
Article Metrics:
Last update:
Detection of dos attacks using naive bayes method based on internet of things (iot)
Proceedings of the 12th International Conference on Green Technology (ICGT 2022)
Last update: 2024-11-03 07:33:33
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.