Penerapan Algoritma RSA Dalam Keamanan File Ms Word
Abstract
Perkembangan sistem keamanan sangat cepat dan pesat, hal ini yang menyebabkan munculnya kemajuan teknologi informasi. Secara langsung atau tidak, teknologi informasi telah menjadi bagian penting dari berbagai bidang kehidupan. Teknologi juga memberikan kemudahan untuk bertukar informasi sehingga keamanan data tidak dapat lepas dari berbagai aspek kegiatan manusia yang memungkinkan dapat menjaga kerahasiaan informasi tersebut, namun dalam implementasinya masih terdapat kecurangan dan ancaman terhadap data khususnya pada data file word (isi file).Oleh karena itu dibutuhkan suatu sistem keamanan yang mampu menjaga kerahasiaan data dari ancaman lain yang dilakukan oleh pihak yang tidak bertanggung jawab. Dengan memanfaatkan algoritma RSA ini system akan mengenkripsi data asli yang diinputkan pengguna menjadi chipertkes dengan menggunakan key, kemudian mengirimkan kepada orang lain ataupun rekannya.
References
[2] Samsir, “Klasifikasi Penyakit Tenggorokan Hidung Telinga ( THT ) Menggunakan Jaringan Syaraf Tiruan Dengan Metode Learning Vektor Quantization ( THT ) Di RSUD Rantauprapat Labuhanbatu Klasifikasi penyakit Tenggorokan Hidung Telinga ( THT ) Menggunakan,” vol. 05, no. 01, pp. 38–47, 2019.
[3] M. Siddik and S. Samsir, “Rancang Bangun Sistem Informasi Pos (Point of Sale) Untuk Kasir Menggunakan Konsep Bahasa Pemrograman Orientasi Objek,” JOISIE (Journal Inf. Syst. Informatics Eng., vol. 4, no. 1, p. 43, 2020, doi: 10.35145/joisie.v4i1.607.
[4] Samsir and Syaiful Zuhri Harahap, “Application Design Resume Medical By Using Microsoft Visual Basic. Net 2010 At the Health Center Appointments,” Int. J. Sci. Technol. Manag., vol. 1, no. 1, pp. 14–20, 2020, doi: 10.46729/ijstm.v1i1.5.
[5] B. Siswa and S. Dasar, “Pengembangan media pembelajaran multimedia interaktif dalam peningkatan kemampuan melaksanakan shalat bagi siswa sekolah dasar,” vol. 13, no. 1, pp. 39–47, 2021.
[6] A. H. Dalimunthe, R. Aditiya, and R. Watrianthos, “Implementation Naïve Bayes Classification for Sentiment Analysis on Internet Movie Database,” vol. 4, no. 1, pp. 4–9, 2022, doi: 10.47065/bits.v4i1.1468.
[7] U. Verawardina, F. Edi, and R. Watrianthos, “Analisis Sentimen Pembelajaran Daring Pada Twitter di Masa Pandemi COVID-19 Menggunakan Metode Naïve Bayes,” vol. 5, pp. 157–163, 2021, doi: 10.30865/mib.v5i1.2604.
[8] Firman Edi, A. Ambiyar, U. Verawardina, S. Samsir, and R. Watrianthos, “Improving Lesson Plan Models Using Online-Based in the New Normal Era,” EDUTEC J. Educ. Technol., vol. 4, no. 3, pp. 527–535, 2021, doi: 10.29062/edu.v4i3.109.
[9] J. H. P. Sitorus et al., “Perancangan pengontrol lampu rumah miniatur dengan menggunakan micro controler arduino berbasis android 1,” vol. 4, no. 1, pp. 1–11, 2020.
[10] A. Syahputra, D. I. G. Hts, and Samsir, “Perancangan Aplikasi Media Pembelajaran Jarimatika Penjumlahan Dan Pengurangan Berbasis Multimedia,” U-NET J. Tek. Inform., vol. 3, no. 1, pp. 35–42, 2019, doi: 10.52332/u-net.v3i1.20.
[11] S. P. Sitorus and S. Samsir, “Perancangan Aplikasi Game Tetris Batu Bara,” U-NET J. Tek. Inform., vol. 3, no. 2, pp. 35–41, 2019, doi: 10.52332/u-net.v3i2.290.
[12] E. S. Budi, E. Hariska, and G. L. Ginting, “Implementation of the Simple Additive Weighting Method in Determining Recipients of Subsidized Food Materials for Poor Families,” vol. 3, no. 3, pp. 384–392, 2021, doi: 10.47065/bits.v3i3.1097.
[13] “OVERVIEW OF EDUCATION ON THE PHILOSOPHY OF PANCASILA AND OVERVIEW OF EDUCATION ON THE PHILOSOPHY OF PANCASILA AND INDONESIAN EDUCATION SYSTEM,” no. September, 2020.
[14] S. Samsir, J. H. P. Sitorus, Z. Ritonga, and F. Aini, “Comparison of machine learning algorithms for chest X-ray image COVID-19 classification Comparison of machine learning algorithms for chest X-ray image COVID-19 classification,” doi: 10.1088/1742-6596/1933/1/012040.
[15] S. M. Oriented, “Edge Detection to Make Drawing Sketch using Laplacian Operator and Gabor Wavelet for Learning Devices ( GJH ’ HWHFWLRQ WR 0DNH ’ UDZLQJ 6NHWFK XVLQJ / DSODFLDQ 2SHUDWRU DQG * DERU : DYHOHW IRU / HDUQLQJ ’ HYLFHV,” doi: 10.1088/1742-6596/1764/1/012070.
[16] O. Access, “The optimalization of backpropagation neural networks to simplify decision making The optimalization of backpropagation neural networks to simplify decision making,” 2020, doi: 10.1088/1757-899X/830/2/022091.
Copyright (c) 2022 Ulfah Indriani, Ommi Alfina, Nita Syahputri

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).
