CRYPTOGRAPHY OF CHACHA20 and RSA ALGORITHMS for TEXT SECURITY
DOI:
10.47709/cnahpc.v7i1.5345Keywords:
ChaCha20 encryption;, Cryptographic Implementation;, Cyberattack Prevention;, Data Security;, RSA algorithmDimension Badge Record
Abstract
The purpose of this study is to apply the ChaCha20 and RSA cryptographic algorithms to enhance text security and safeguard data from unauthorized access, data breaches, and cyberattacks such as man-in-the-middle or replay attacks. ChaCha20, a symmetric encryption algorithm, is employed for generating efficient and secure keystreams, while RSA, an asymmetric algorithm, is used for encrypting numeric keys or messages. The integration of these two algorithms ensures robust data protection from various digital threats. The choice of this title stems from the growing urgency to prioritize data security in the digital era, especially given the increasing incidents of data leaks that often lead to significant consequences. This research focuses on analyzing the implementation of both algorithms in encryption and decryption processes, as well as evaluating their effectiveness in preserving data confidentiality and integrity. The findings of this study demonstrate that the ChaCha20 and RSA implementations effectively secure data, with the encryption and decryption processes functioning as intended. To further validate the system’s robustness, simulated attacks were conducted, and the results confirmed the system's ability to prevent unauthorized access. This research not only contributes to the development of reliable data security solutions but also highlights opportunities for future improvements. Enhancing algorithm efficiency and optimizing encryption runtime are potential areas for further exploration. By addressing these challenges, the study aims to pave the way for more robust and efficient cryptographic solutions in the evolving landscape of digital security.
Downloads
Abstract viewed = 31 times
References
Forouzan, B. A. (2008). Introduction to cryptography and network security. New York, America: McGraw-Hill Higher Education.
KEBANDE, V. R. (2023). Extended-Chacha20 Stream Cipher With Enhanced Quarter Round Function, 11. doi: 10.1109
Enung, N. (2016). APLIKASI ENKRIPSI DAN DEKRIPSI MENGGUNAKAN ALGORITMA RSA BERBASIS WEB
Campbell, T. R. (2020). Daence: Salsa20 and ChaCha in deterministic authenticated encryption with no noNCEnse. Cryptology ePrint Archive. Retrieved from https://eprint.iacr.org/2020/067
Siregar, S. J., Nugroho, N. B., & Sigalingging, H. (2023). Implementasi algoritma kriptografi RSA (Rivest Shamir Adleman) dalam pengamanan data gaji karyawan di kantor BSPJI. Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer), 22(2), 528–538.
Chyquitha, D. (2018). Pengamanan Data Melalui Cloud Computing Dengan Integrasi Steganografi LSB Dan Kriptografi Vigenere Key Berbasis Android.
Liu, Y., Gong, W., & Fan, W. (2018). Application of AES and RSA hybrid algorithm in e-mail. In Proceedings of the 2018 IEEE International Conference on Information Security (ICIS). IEEE. https://doi.org/10.1109/ICIS.2018.00000
Muhammad, A. (2019). Implementasi Algoritma Enkripsi Blowfish pada Sistem Revisi Anggaran Berbasis Online (studi kasus : perpustakaan nasional republik indonesia).
Novita P. D, dkk. (2022). pengamanan data dengan kriptografi hibrida algoritma HILL CIPHER dan Algoritma LUC Serta Steganografi Chaotic LSB.
Fadhil, F. A., Alhilo, F. T. A. H., & Abdulhadi, M. T. (2024). Enhancing data security using Laplacian of Gaussian and ChaCha20 encryption algorithm. Journal of Intelligent Systems, 33, 20240191.
Cai, W., Chen, H., Wang, Z., & Zhang, X. (2021). Implementation and optimization of ChaCha20 stream cipher on Sunway TaihuLight supercomputer. The Journal of Supercomputing. https://doi.org/10.1007/s11227-021-04023-9
Minggu, D., Nurpratama, R. S., & Setiawan, R. B. (2024). Pengembangan kunci enkripsi asimetris pada Vigenère cipher. JATI (Jurnal Mahasiswa Teknik Informatika), 8(6), [article number]. https://doi.org/10.36040/jati.v8i6.11968
Dola R, dkk.(2024). Strategi Perlindungan Data Menggunakan Sistem Kriptografi Dalam Keamanan Informasi
Ramalinda, D., Jayadi, & Raharja, A. R. (2024). Strategi perlindungan data menggunakan sistem kriptografi dalam keamanan informasi. Journal of International Multidisciplinary Research, 2(6), 665–671
.
Pramudita, K. E. (n.d.). Brute force attack dan penerapannya pada password cracking. Program Studi Teknik Informatika, Sekolah Teknik Elektro dan Informatika, Institut Teknologi Bandung.
Mondal dan Primajaya(2024). THE IMPLEMENTATION OF RSA ALGORITHM IN TEXT MESSAGES ENCRYPTION AND DECRYPTION
Ariel H, dkk.(2015). Cryptography for Big Data Security Book Chapter for Big Data: Storage, Sharing, and Security (3S)
Downloads
ARTICLE Published HISTORY
How to Cite
Issue
Section
License
Copyright (c) 2025 Ziad Yasqi Dzahabi, Nurul Hayaty, Martaleli Bettiza

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.