ac

CRYPTOGRAPHY OF CHACHA20 and RSA ALGORITHMS for TEXT SECURITY

Authors

  • Ziad Yasqi Dzahabi Program Studi Teknik Informatika Fakultas Teknik dan Teknologi Kemaritiman, Universitas Maritim Raja Ali Haji, Tanjungpinang, Indonesia
  • Nurul Hayaty Program Studi Teknik Informatika Fakultas Teknik dan Teknologi Kemaritiman, Universitas Maritim Raja Ali Haji, Tanjungpinang, Indonesia
  • Martaleli Bettiza Program Studi Teknik Informatika Fakultas Teknik dan Teknologi Kemaritiman, Universitas Maritim Raja Ali Haji, Tanjungpinang, Indonesia

DOI:

10.47709/cnahpc.v7i1.5345

Keywords:

ChaCha20 encryption;, Cryptographic Implementation;, Cyberattack Prevention;, Data Security;, RSA algorithm

Dimension Badge Record



Abstract

The purpose of this study is to apply the ChaCha20 and RSA cryptographic algorithms to enhance text security and safeguard data from unauthorized access, data breaches, and cyberattacks such as man-in-the-middle or replay attacks. ChaCha20, a symmetric encryption algorithm, is employed for generating efficient and secure keystreams, while RSA, an asymmetric algorithm, is used for encrypting numeric keys or messages. The integration of these two algorithms ensures robust data protection from various digital threats. The choice of this title stems from the growing urgency to prioritize data security in the digital era, especially given the increasing incidents of data leaks that often lead to significant consequences. This research focuses on analyzing the implementation of both algorithms in encryption and decryption processes, as well as evaluating their effectiveness in preserving data confidentiality and integrity. The findings of this study demonstrate that the ChaCha20 and RSA implementations effectively secure data, with the encryption and decryption processes functioning as intended. To further validate the system’s robustness, simulated attacks were conducted, and the results confirmed the system's ability to prevent unauthorized access. This research not only contributes to the development of reliable data security solutions but also highlights opportunities for future improvements. Enhancing algorithm efficiency and optimizing encryption runtime are potential areas for further exploration. By addressing these challenges, the study aims to pave the way for more robust and efficient cryptographic solutions in the evolving landscape of digital security.

Downloads

Download data is not yet available.
Google Scholar Cite Analysis
Abstract viewed = 31 times

References

Forouzan, B. A. (2008). Introduction to cryptography and network security. New York, America: McGraw-Hill Higher Education.

KEBANDE, V. R. (2023). Extended-Chacha20 Stream Cipher With Enhanced Quarter Round Function, 11. doi: 10.1109

Enung, N. (2016). APLIKASI ENKRIPSI DAN DEKRIPSI MENGGUNAKAN ALGORITMA RSA BERBASIS WEB

Campbell, T. R. (2020). Daence: Salsa20 and ChaCha in deterministic authenticated encryption with no noNCEnse. Cryptology ePrint Archive. Retrieved from https://eprint.iacr.org/2020/067

Siregar, S. J., Nugroho, N. B., & Sigalingging, H. (2023). Implementasi algoritma kriptografi RSA (Rivest Shamir Adleman) dalam pengamanan data gaji karyawan di kantor BSPJI. Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer), 22(2), 528–538.

Chyquitha, D. (2018). Pengamanan Data Melalui Cloud Computing Dengan Integrasi Steganografi LSB Dan Kriptografi Vigenere Key Berbasis Android.

Liu, Y., Gong, W., & Fan, W. (2018). Application of AES and RSA hybrid algorithm in e-mail. In Proceedings of the 2018 IEEE International Conference on Information Security (ICIS). IEEE. https://doi.org/10.1109/ICIS.2018.00000

Muhammad, A. (2019). Implementasi Algoritma Enkripsi Blowfish pada Sistem Revisi Anggaran Berbasis Online (studi kasus : perpustakaan nasional republik indonesia).

Novita P. D, dkk. (2022). pengamanan data dengan kriptografi hibrida algoritma HILL CIPHER dan Algoritma LUC Serta Steganografi Chaotic LSB.

Fadhil, F. A., Alhilo, F. T. A. H., & Abdulhadi, M. T. (2024). Enhancing data security using Laplacian of Gaussian and ChaCha20 encryption algorithm. Journal of Intelligent Systems, 33, 20240191.

Cai, W., Chen, H., Wang, Z., & Zhang, X. (2021). Implementation and optimization of ChaCha20 stream cipher on Sunway TaihuLight supercomputer. The Journal of Supercomputing. https://doi.org/10.1007/s11227-021-04023-9

Minggu, D., Nurpratama, R. S., & Setiawan, R. B. (2024). Pengembangan kunci enkripsi asimetris pada Vigenère cipher. JATI (Jurnal Mahasiswa Teknik Informatika), 8(6), [article number]. https://doi.org/10.36040/jati.v8i6.11968

Dola R, dkk.(2024). Strategi Perlindungan Data Menggunakan Sistem Kriptografi Dalam Keamanan Informasi

Ramalinda, D., Jayadi, & Raharja, A. R. (2024). Strategi perlindungan data menggunakan sistem kriptografi dalam keamanan informasi. Journal of International Multidisciplinary Research, 2(6), 665–671

.

Pramudita, K. E. (n.d.). Brute force attack dan penerapannya pada password cracking. Program Studi Teknik Informatika, Sekolah Teknik Elektro dan Informatika, Institut Teknologi Bandung.

Mondal dan Primajaya(2024). THE IMPLEMENTATION OF RSA ALGORITHM IN TEXT MESSAGES ENCRYPTION AND DECRYPTION

Ariel H, dkk.(2015). Cryptography for Big Data Security Book Chapter for Big Data: Storage, Sharing, and Security (3S)

Downloads

ARTICLE Published HISTORY

Submitted Date: 2025-01-17
Accepted Date: 2025-01-17
Published Date: 2025-02-01

How to Cite

Dzahabi, Z. Y., Hayaty, N. ., & Bettiza, M. . (2025). CRYPTOGRAPHY OF CHACHA20 and RSA ALGORITHMS for TEXT SECURITY. Journal of Computer Networks, Architecture and High Performance Computing, 7(1), 290-301. https://doi.org/10.47709/cnahpc.v7i1.5345