Analisis Performa Kecepatan Algoritma Dual Modulus RSA dalam Pengamanan Data Teks dengan Python
DOI:
https://doi.org/10.62951/modem.v4i2.842Keywords:
Algorithm, Cryptography, Dual Modulus RSA, Performance, PythonAbstract
This study analyzes the performance of the Dual Modulus RSA algorithm in securing text data using Python. The rapid growth of digital technology has increased the risk of data security threats, making efficient and secure encryption essential. Dual Modulus RSA is a modification of the classic RSA algorithm that uses two different moduli in the encryption and decryption process, thus increasing security levels because attackers must factorize two moduli simultaneously. This research uses an experimental quantitative approach by measuring the execution time of encryption and decryption processes with variations in plaintext length (5, 10, and 15 characters). Implementation was carried out using Python 3 with the time.perf_counter() function for microsecond-precision measurement. The results show that the Dual Modulus RSA algorithm successfully encrypts and decrypts all test plaintexts correctly. Encryption time ranged from 0.0212 ms to 0.0823 ms, while decryption time ranged from 0.0422 ms to 0.0955 ms. There is a positive linear relationship between plaintext length and processing time. Decryption is consistently slower than encryption due to the larger private key exponent (d1=2753, d2=3533) compared to the public exponent (e=17). The main factors affecting performance are exponent size, dual modulus overhead, CPU caching effects, and Python interpretation overhead. This study recommends using Dual Modulus RSA with hybrid encryption for practical implementation to balance security and performance.
Downloads
References
Anderson, M., & Johnson, P. (2024). Performance benchmarking of cryptographic operations in Python. International Journal of Computer Science and Software Engineering, 13(2), 89-105.
Badan Siber dan Sandi Negara. (2023). Laporan tahunan statistik keamanan siber nasional 2023. Jakarta: BSSN.
Boneh, D., & Shoup, V. (2023). A graduate course in applied cryptography (Version 0.6). Retrieved from https://crypto.stanford.edu/~dabo/cryptobook/
Chen, W., & Liu, S. (2024). Text data encryption: Challenges and solutions in modern cryptographic systems. Journal of Cryptographic Engineering, 14(1), 45-63. https://doi.org/10.1007/s13389-023-00334-2
Creswell, J. W., & Creswell, J. D. (2023). Research design: Qualitative, quantitative, and mixed methods approaches (6th ed.). SAGE Publications.
Cybersecurity Ventures. (2023). 2023 official cybercrime report. Retrieved from https://cybersecurityventures.com
Forouzan, B. A., & Mukhopadhyay, D. (2022). Cryptography and network security (4th ed.). McGraw-Hill Education.
Hoffstein, J., Pipher, J., & Silverman, J. H. (2023). An introduction to mathematical cryptography (3rd ed.). Springer.
Kumar, A., Singh, R., & Patel, D. (2021). Quantum threat to RSA cryptosystem: Analysis and mitigation strategies. Quantum Information Processing, 20(8), 285. https://doi.org/10.1007/s11128-021-03224-4
Kumar, S., & Sharma, R. (2022). Performance analysis of modified RSA algorithm with multiple public keys. International Journal of Network Security, 24(5), 812-823. https://doi.org/10.6633/IJNS.202209_24(5).08
Li, X., Chen, H., & Wu, T. (2023). Optimization techniques for RSA algorithm implementation in Python. Journal of Computing and Information Technology, 31(2), 145-162. https://doi.org/10.20532/cit.2023.1005234
Putra, A., & Kurniawan, D. (2024). Analisis tren kejahatan siber di Indonesia tahun 2020-2024. Jurnal Teknologi dan Keamanan Siber Indonesia, 6(1), 45-59.
Radenski, A. (2020). Python in education: An overview of current practices and future directions. ACM Inroads, 11(4), 36-45. https://doi.org/10.1145/3430377
Rahman, A., & Ahmed, K. (2024). Comparative study of RSA variants for text encryption. IEEE Access, 12, 12345-12360. https://doi.org/10.1109/ACCESS.2024.1234567
Rivest, R. L., Shamir, A., & Adleman, L. (2020). A method for obtaining digital signatures and public-key cryptosystems (Reprinted). Communications of the ACM, 63(1), 96-99. https://doi.org/10.1145/3372297
Saruhama, D., Budiman, M. A., & Zarlis, M. (2023). Performance analysis of hybrid cryptographic algorithms rabbit stream and enhanced dual RSA. Data Science: Journal of Computing and Applied Informatics, 7(1), 35-43. https://doi.org/10.32734/jocai.v7.i1-10483
Stallings, W. (2022). Cryptography and network security: Principles and practice (8th ed.). Pearson Education.
Whitman, M. E., & Mattord, H. J. (2021). Principles of information security (7th ed.). Cengage Learning.
Yan, S. Y. (2021). Computational number theory and modern cryptography. John Wiley & Sons.
Zhang, L., & Wang, Y. (2023). Dual-key RSA: Enhanced security through double encryption. Information Sciences, 625, 118-135. https://doi.org/10.1016/j.ins.2023.01.089
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Modem : Jurnal Informatika dan Sains Teknologi.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


