Analisis Performa Kecepatan Algoritma Dual Modulus RSA dalam Pengamanan Data Teks dengan Python

Authors

  • Romy Atmansyah Iswandi Universitas Nahdlatul Ulama Sumatera Utara
  • Demonius Sarumaha Universitas Nahdlatul Ulama Sumatera Utara
  • Saiful Amir Universitas Nahdlatul Ulama Sumatera Utara

DOI:

https://doi.org/10.62951/modem.v4i2.842

Keywords:

Algorithm, Cryptography, Dual Modulus RSA, Performance, Python

Abstract

This study analyzes the performance of the Dual Modulus RSA algorithm in securing text data using Python. The rapid growth of digital technology has increased the risk of data security threats, making efficient and secure encryption essential. Dual Modulus RSA is a modification of the classic RSA algorithm that uses two different moduli in the encryption and decryption process, thus increasing security levels because attackers must factorize two moduli simultaneously. This research uses an experimental quantitative approach by measuring the execution time of encryption and decryption processes with variations in plaintext length (5, 10, and 15 characters). Implementation was carried out using Python 3 with the time.perf_counter() function for microsecond-precision measurement. The results show that the Dual Modulus RSA algorithm successfully encrypts and decrypts all test plaintexts correctly. Encryption time ranged from 0.0212 ms to 0.0823 ms, while decryption time ranged from 0.0422 ms to 0.0955 ms. There is a positive linear relationship between plaintext length and processing time. Decryption is consistently slower than encryption due to the larger private key exponent (d1=2753, d2=3533) compared to the public exponent (e=17). The main factors affecting performance are exponent size, dual modulus overhead, CPU caching effects, and Python interpretation overhead. This study recommends using Dual Modulus RSA with hybrid encryption for practical implementation to balance security and performance.

Downloads

Download data is not yet available.

References

Anderson, M., & Johnson, P. (2024). Performance benchmarking of cryptographic operations in Python. International Journal of Computer Science and Software Engineering, 13(2), 89-105.

Badan Siber dan Sandi Negara. (2023). Laporan tahunan statistik keamanan siber nasional 2023. Jakarta: BSSN.

Boneh, D., & Shoup, V. (2023). A graduate course in applied cryptography (Version 0.6). Retrieved from https://crypto.stanford.edu/~dabo/cryptobook/

Chen, W., & Liu, S. (2024). Text data encryption: Challenges and solutions in modern cryptographic systems. Journal of Cryptographic Engineering, 14(1), 45-63. https://doi.org/10.1007/s13389-023-00334-2

Creswell, J. W., & Creswell, J. D. (2023). Research design: Qualitative, quantitative, and mixed methods approaches (6th ed.). SAGE Publications.

Cybersecurity Ventures. (2023). 2023 official cybercrime report. Retrieved from https://cybersecurityventures.com

Forouzan, B. A., & Mukhopadhyay, D. (2022). Cryptography and network security (4th ed.). McGraw-Hill Education.

Hoffstein, J., Pipher, J., & Silverman, J. H. (2023). An introduction to mathematical cryptography (3rd ed.). Springer.

Kumar, A., Singh, R., & Patel, D. (2021). Quantum threat to RSA cryptosystem: Analysis and mitigation strategies. Quantum Information Processing, 20(8), 285. https://doi.org/10.1007/s11128-021-03224-4

Kumar, S., & Sharma, R. (2022). Performance analysis of modified RSA algorithm with multiple public keys. International Journal of Network Security, 24(5), 812-823. https://doi.org/10.6633/IJNS.202209_24(5).08

Li, X., Chen, H., & Wu, T. (2023). Optimization techniques for RSA algorithm implementation in Python. Journal of Computing and Information Technology, 31(2), 145-162. https://doi.org/10.20532/cit.2023.1005234

Putra, A., & Kurniawan, D. (2024). Analisis tren kejahatan siber di Indonesia tahun 2020-2024. Jurnal Teknologi dan Keamanan Siber Indonesia, 6(1), 45-59.

Radenski, A. (2020). Python in education: An overview of current practices and future directions. ACM Inroads, 11(4), 36-45. https://doi.org/10.1145/3430377

Rahman, A., & Ahmed, K. (2024). Comparative study of RSA variants for text encryption. IEEE Access, 12, 12345-12360. https://doi.org/10.1109/ACCESS.2024.1234567

Rivest, R. L., Shamir, A., & Adleman, L. (2020). A method for obtaining digital signatures and public-key cryptosystems (Reprinted). Communications of the ACM, 63(1), 96-99. https://doi.org/10.1145/3372297

Saruhama, D., Budiman, M. A., & Zarlis, M. (2023). Performance analysis of hybrid cryptographic algorithms rabbit stream and enhanced dual RSA. Data Science: Journal of Computing and Applied Informatics, 7(1), 35-43. https://doi.org/10.32734/jocai.v7.i1-10483

Stallings, W. (2022). Cryptography and network security: Principles and practice (8th ed.). Pearson Education.

Whitman, M. E., & Mattord, H. J. (2021). Principles of information security (7th ed.). Cengage Learning.

Yan, S. Y. (2021). Computational number theory and modern cryptography. John Wiley & Sons.

Zhang, L., & Wang, Y. (2023). Dual-key RSA: Enhanced security through double encryption. Information Sciences, 625, 118-135. https://doi.org/10.1016/j.ins.2023.01.089

Downloads

Published

2026-04-15

How to Cite

Romy Atmansyah Iswandi, Demonius Sarumaha, & Saiful Amir. (2026). Analisis Performa Kecepatan Algoritma Dual Modulus RSA dalam Pengamanan Data Teks dengan Python. Modem : Jurnal Informatika Dan Sains Teknologi., 4(2), 01–10. https://doi.org/10.62951/modem.v4i2.842

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.