Grace Lamudur Arta Sihombing


Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman) algorithm. The advantages of hybrid cryptography is the speed in processing data using a symmetric algorithm and easy transfer of key using asymmetric algorithm. This can increase the speed of transaction processing data. Stream Cipher Algorithm using the image digital signature as a keys, that will be secured by the RSA algorithm. So, the key for encryption and decryption are different. Blum Blum Shub methods used to generate keys for the value p, q on the RSA algorithm. It will be very difficult for a cryptanalyst to break the key. Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger or smaller so that the time required for encryption and decryption process is relatively fast.

Full Text:



Munir, R. 2006. Kriptografi. Penerbit Informatika : Bandung.

Mahajan Sonam & Sigh Maninder., 2014. Performance Analysis of Efficient RSA.

Kromodimoelyo, S. 2010. Teori dan Aplikasi Kriptografi. SPK IT Consulting. ISBN: 78-602-96233-0-7.

Mollin, Richard A. 2003. RSA and Public-Key Cryptography. Discrete Mathematics And Its Applications Series Editor Kenneth H. Rosen. Chapman & Hall/CRC. A CRC : Press Company Boca Raton London New York Washington, D.C.

Menezes, A. J, Paul C. V. O. & Scott A. V,. 1996. Handbook of Applied Cryptography. CRC Press.

Oppliger, R., 2005. Contemporary Cryptography (Artech House Computer Security Series). Amazon.

Dooley, J.F. 2013. A Brief History Of Cryptology and Cryptographic Algorithms.


  • There are currently no refbacks.

InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan)

Program Studi Teknik Informatika - Universitas Islam Sumatera Utara
Website : http://jurnal.uisu.ac.id/index.php/infotekjar/index
Email : infotekjar@ft.uisu.ac.id

Creative Commons License
InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan) is licensed under a Creative Commons Attribution 4.0 International License