Pengimplementasian Algoritma RSA Untuk Mengamankan E-mail Menggunakan Outlook dan OpenPGP
DOI:
https://doi.org/10.30865/resolusi.v3i2.589Keywords:
E-mail; Cryptography; MsOutlook; Open PGP; RSAAbstract
The development of technology is enough to help humans in carrying out their daily activities. With the existence of technology, humans can easily access data and information anywhere and anytime. The use of technology most often used by people is to communicate because it can connect quickly and easily. The many activities that can be carried out through technology make some people need security and confidentiality in their activities and in their communications. The RSA algorithm has 2 types of keys for security, namely the Public key and the Private key. The public key can be given to anyone while the private key can only be known by interested people. MsOutlook is software that can be used to exchange messages with other people and Open PGP is software that is equipped with cryptographic capabilities, namely encryption and decryption. Encryption is used to convert messages that were originally plaintext to ciphertext and decryption is used to translate ciphertext to plaintext. The purpose of this research is to help explain how MsOutlook and Open PGP are integrated with each other to help maintain the confidentiality of messages sent. As for the results obtained from the results of this research is to display encryption and decryption in maintaining the confidentiality of messages that have been sent by using a passphrase to access the message.
Downloads
References
A. Mawarsih, “PENGARUH ELECTRONIC MAIL SEBAGAI MEDIA KOMUNIKASI TERKADAP MENGERJAKAN TUGAS KULIAH MAHASISWA,” Ejurnal Ilmu Komunikasi, vol. 2, no. 1, pp. 334–348, 2014.
B. Hozairi et al., “Implementasi Kriptografi Pada File Attachment Email IMPLEMENTASI KRIPTOGRAFI PADA FILE ATTACHMENT EMAIL,” no. c, pp. 75–81, 2018.
R. Saleh and I. Imelda, “Kriptografi Email menggunakan Algoritma Rivest Code 6 (Rc6) berbasis Java Pada PT. XYZ,” Proceeding Seminar Nasional …, vol. 6, 2018.
Suhardi, “Aplikasi Kriptografi Data Sederhana Dengan Metode Exlusive-or (Xor),” Jurnal Teknovasi, vol. 03, no. 2, pp. 23–31, 2016.
M. M. Amin, “Implementasi Kriptografi Klasik Pada Komunikasi Berbasis Teks,” Pseudocode, vol. 3, no. 2, pp. 129–136, 2017, doi: 10.33369/pseudocode.3.2.129-136.
A. Cahya Putra, M. Simanjuntak, and Nurhayati, “Penerapan Algoritma Rivest Shamir Adleman (Rsa) Untuk Mengamankan Database Program Keluarga Harapan (PKH),” Jurnal Teknik Informatika Kaputama (JTIK), vol. 5, no. 1, pp. 76–84, 2021.
M. I. Zulfikar, G. Abdillah, and A. Komarudin, “Kriptografi untuk Keamanan Pengiriman Email Menggunakan Blowfish dan Rivest Shamir Adleman (RSA),” Seminar Nasional Aplikasi Teknologi Informasi (SNATi), pp. 19–26, 2019.
A. Rosyadi, “Implementasi Algoritma Kriptografi AES Untuk Enkripsi Dan Dekripsi Email,” Transient, vol. 1, no. 3, pp. 2–6, 2012.
F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Informatika Mulawarman?: Jurnal Ilmiah Ilmu Komputer, vol. 10, no. 1, p. 20, 2016, doi: 10.30872/jim.v10i1.23.
A. Ginting, R. R. Isnanto, and I. P. Windasari, “Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email,” Jurnal Teknologi dan Sistem Komputer, vol. 3, no. 2, p. 253, 2015, doi: 10.14710/jtsiskom.3.2.2015.253-258.
D. Apdilah and H. Swanda, “Penerapan Kriptografi RSA Dalam Mengamankan File Teks Berbasis PHP,” Jurnal Teknologi Informasi, vol. 2, no. 1, p. 45, 2018, doi: 10.36294/jurti.v2i1.407.
M. Rizki and P. Farida Ariyani, “Penerapan Kriptografi Dengan Menggunakan Algoritma Rsa Untuk Pengamanan Data Berbasis Desktop Pada Pt Trias Mitra Jaya Manunggal,” Skanika, vol. 4, no. 2, pp. 1–6, 2021, doi: 10.36080/skanika.v4i2.1991.
D. P. Pahrizal, “Implementasi Algoritma Rsa Untuk Pengamanan Data Berbentuk Teks,” Jurnal Pseudocode, vol. III, no. 1, p. ISSN?: 2355 – 5920, 2013.
R. I. Ananda, Fauziah, and N. Hayati, “Keamanan Email Menggunakan Metode Pretty Good Privacy Dengan Algoritma Rsa,” Jurnal Ilmiah Informatika Komputer, vol. 25, no. 3, pp. 213–224, 2020, doi: 10.35760/ik.2020.v25i3.3118.
P. I, “Microsoft Outlook Bagi Pemula,” JIKEM: Jurnal Ilmu Komputer, Ekonomi dan Manajemen, vol. 2, no. 2, pp. 2871–2879, 2022.
R. Setyadi, A. Fattah, and B. Waseso, “Trust Effect on Business-IT Governance Alignment in Society Culture (A Case Study in Indonesia),” 2019 7th International Conference on Cyber and IT Service Management, CITSM 2019, no. January 2020, pp. 2–7, 2019, doi: 10.1109/CITSM47753.2019.8965411.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Pengimplementasian Algoritma RSA Untuk Mengamankan E-mail Menggunakan Outlook dan OpenPGP
ARTICLE HISTORY
Issue
Section
Copyright (c) 2023 Sri Ana Margareth Nababan, Resad Setyadi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).














