Please use this identifier to cite or link to this item: http://repository.ipb.ac.id/handle/123456789/47231
Title: Implementasi aritmatik field prima dengan bahasa c
Authors: Guritman, Sugi
Haryadi
Keywords: Bogor Agricultural University (IPB)
cryptography
public-key cryptography
big number
Issue Date: 2011
Publisher: IPB (Bogor Agricultural University)
Abstract: Cryptography is the science of keeping message secure. Cryptography involves encryption and decryption of messages. Encryption is the process of converting a plaintext into chipertext and decryption is the process of getting back the encrypted message. Cryptographic systems can be divided into two kinds: symmetric-key cryptography and asymmetric-key cryptography (publickey cryptography). The major advantage of symmetric-key cryptography is high efficiency, but it has a number of drawbacks like key distribution and the provision of non-repudiation. Public-key cryptography provides solution to the problems in symmetric-key cryptography. Unfortunately, public-key operations are significantly slower than symmetric-key operation. It is caused by using a big number in its operations. The biggest problem of the big number is how to compute it in constrained machines like computer. A computer’s hardware can only perform operations on integers smaller than the machine word-size W. If bigger numbers are needed, the programmer has to provide routines for representation and manipulation of big number. In this research, big number is representated with base 2 W. This base is efficient in memory-space. Arithmetic of big number is constrained in prime-field. The big number that is used in this arithmetic is up to 1024 bit. Operations of this arithmetic are addition, subtraction, multiplication, division, and exponentiation. The result of this research shows that operations of big number can be executed fast in 32-bit computer
URI: http://repository.ipb.ac.id/handle/123456789/47231
Appears in Collections:UT - Computer Science

Files in This Item:
File Description SizeFormat 
Abstract_ G11har.pdf
  Restricted Access
Abstract270.19 kBAdobe PDFView/Open
G11har.pdf
  Restricted Access
Full Text396.98 kBAdobe PDFView/Open
BAB I Pendahuluan_ G11har.pdf
  Restricted Access
BAB I281.46 kBAdobe PDFView/Open
BAB II Tinjauan Pustaka_ G11har.pdf
  Restricted Access
BAB II296.82 kBAdobe PDFView/Open
BAB III Metode Penelitian_ G11har.pdf
  Restricted Access
BAB III273.8 kBAdobe PDFView/Open
BAB IV Pembahasan_ G11har.pdf
  Restricted Access
BAB IV350.26 kBAdobe PDFView/Open
BAB V Simpulan_ G11har.pdf
  Restricted Access
BAB V278.37 kBAdobe PDFView/Open
Cover_ G11har.pdf
  Restricted Access
Cover269.28 kBAdobe PDFView/Open
Daftar Pustaka_G11har.pdf
  Restricted Access
Daftar Pustaka270.08 kBAdobe PDFView/Open
Lampiran_ G11har.pdf
  Restricted Access
Lampiran284.82 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.