Implementasi Algoritma Kriptografi RSA dalam Proses Enkripsi dan Dekripsi untuk Mengamankan Pesan Singkat pada Aplikasi Chatting Berbasis Web

Authors

  • Nurul Surbakti Universitas Negeri Medan
  • Dinda Kartika Universitas Negeri Medan
  • Alya Dwi Lestari Universitas Negeri Medan
  • Maysi Puspita Universitas Negeri Medan
  • Petra Putri Sarinah Pandiangan Universitas Negeri Medan
  • Riamonda Singarimbun Universitas Negeri Medan
  • Windi Suryani Universitas Negeri Medan

DOI:

https://doi.org/10.55606/juitik.v5i3.1711

Keywords:

Chat Application, Cryptography, Data Security, Encryption-Decryption, RSA Algorithm

Abstract

The rapid development of information technology, especially in online communication, raises concerns about the security and privacy of transmitted messages. Cryptography serves as a primary alternative to protect information from unauthorized access. This study aims to implement the RSA (Rivest Shamir Adleman) cryptographic algorithm to secure short messages in a web-based chat application. The research method used was a mixed method, combining literature study and application development trials. The designed application uses the Flask framework for the backend, while HTML, CSS, and JavaScript are used for the user interface. The implementation results show that the RSA algorithm successfully converted plaintext messages (e.g., "Haii") into ciphertext (such as [7347,3641,4742,4742]) using a public key and accurately restored them to the original message using a private key, without any loss of information. This application offers an interactive and visual interface, making it easier for users to understand the RSA encryption and decryption process. Testing confirmed a consistency between manual calculations and the application's functions, proving that the system works stably and accurately. It is concluded that the RSA algorithm can be used effectively to protect short messages on web-based chat platforms, serving not only as a secure communication tool but also as an effective learning medium for asymmetric cryptography concepts. For future development, it is recommended to use larger prime numbers to enhance security, as well as to add features such as file sharing and group chats.

 

References

Arief, A., & Saputra, R. (2016). Implementasi kriptografi kunci publik dengan algoritma RSA-CRT pada aplikasi instant messaging. Scientific Journal of Informatics, 3(1), 46–54. https://doi.org/10.15294/sji.v3i1.6115

Arief, M., & Ikhsan, N. (2015). Kriptografi RSA pada aplikasi file transfer client-server based. Jurnal Ilmiah Teknologi Informasi Terapan, 1(3), 3–7.

Dairi, M. S., Setiani Asih, M., & (author correspondent). (2022). Implementasi algoritma kriptografi RSA dalam aplikasi sistem informasi perpustakaan. Jurnal Ilmiah Riset Sistem Informasi, 2023(2), 98–107. https://jurnal.unity-academy.sch.id/index.php/jirsi/index

Fajrin, A. M., Kelvin, C., Owen, B., & Aji, B. (2024). Perbandingan performa dari algoritma AES dan RSA dalam keamanan transaksi. KESATRIA: Jurnal Penerapan Sistem Informasi, 5(2), 696–705.

Hidayat, M., Tahir, M., Sukriyadi, A., Sulton, A., A. C. A. S., & F. S. A. (2023). Penerapan kriptografi Caesar cipher dalam pengamanan data. Jurnal Ilmiah Multidisiplin, 2(03), 35–41. https://doi.org/10.56127/jukim.v2i03.619

Iii, B. A. B., Penelitian, M., Westerdal, M., Rights, A., Copyright, I., Alam, H., Pasaribu, K. M., Saragi, D. R., Gultom, J. M., ..., & Febrianto, A. (2019). Perbandingan efisiensi algoritma RSA dan RSA-CRT. Jurnal Informatika, 1(2), 1689–1699. http://e-jurnal.pelitanusantara.ac.id/index.php/mantik/article/view/253

Informasi, S., Pamulang, U., Raya, J., Serpong, P., & Tangerang, N. (2023). Untuk pesan rahasia berbasis web. Jurnal Sistem Informasi, 6(03), 50–54.

Nanda, N. A., Silalahi, S. M. S., Nasution, D. F., Sari, M., & Gunawan, I. (2023). Kriptografi dan penerapannya dalam sistem keamanan data. Jurnal Media Informatika, 4(2), 90–93. https://doi.org/10.55338/jumin.v4i2.428

Nurul, S., Anggrainy, S., & Aprelyani, S. (2022). Faktor-faktor yang mempengaruhi keamanan sistem informasi: Keamanan informasi, teknologi informasi, dan network (literature review SIM). Jurnal Ekonomi Manajemen Sistem Informasi, 3(5), 564–573. https://doi.org/10.31933/jemsi.v3i5.992

Ramadhan, A. A. I., Rivanti, E. Z., & Zulva, R. S. (2023). Implementasi kriptografi AES menggunakan bahasa Java programming: Meningkatkan keamanan data melalui enkripsi & dekripsi yang kuat. Jurnal Pendidikan Teknologi Informasi, 20–26. https://jurnal.umj.ac.id/index.php/TripleA/article/view/17513

Sari, M., Purnomo, H. D., & Sembiring, I. (2022). Review: Algoritma kriptografi sistem keamanan SMS di Android. Journal of Information Technology, 2(1), 11–15. https://doi.org/10.46229/jifotech.v2i1.292

Siregar, S. J., Nugroho, N. B., & Sigalingging, H. (2023). Implementasi algoritma kriptografi RSA (Rivest Shamir Adleman) dalam pengamanan data gaji karyawan di kantor BSPJI. SAINTIKOM: Jurnal Sains Manajemen Informatika dan Komputer, 22(2), 528. https://doi.org/10.53513/jis.v22i2.9409

Studi Teknik Informatika, P., & Korespondensi, P. (2022). Penerapan kriptografi menggunakan algoritma DES (Data Encryption Standard). Jurnal Sintaks Logika, 2(2), 9–19. https://jurnal.umpar.ac.id/index.php/sylog

Sulaiman, R., & Vebu, M. (2018). Peningkatan keamanan pesan berbasis Android menggunakan algoritma kriptografi RSA. Jurnal Sisfokom (Sistem Informasi dan Komputer), 7(2), 116–120. https://doi.org/10.32736/sisfokom.v7i2.574

Sulaksono, D. H., Prabiantissa, C. N., Yuliastuti, G. E., Taqwa, A. R., Informatika, T., Elektro, T., Informasi, T., Adhi, T., & Surabaya, T. (2021). Implementasi kriptografi dengan metode Elliptic Curve Cryptography (ECC) untuk aplikasi chatting berbasis Android. Prosiding Teknologi Informasi, 570.

Downloads

Published

2025-11-10

How to Cite

Surbakti, N., Kartika, D., Lestari, A. D., Puspita, M., Pandiangan , P. P. S., Singarimbun, R., & Suryani, W. (2025). Implementasi Algoritma Kriptografi RSA dalam Proses Enkripsi dan Dekripsi untuk Mengamankan Pesan Singkat pada Aplikasi Chatting Berbasis Web. Jurnal Ilmiah Teknik Informatika Dan Komunikasi, 5(3), 647–659. https://doi.org/10.55606/juitik.v5i3.1711

Similar Articles

<< < 11 12 13 14 15 16 17 18 19 > >> 

You may also start an advanced similarity search for this article.