Call for Paper

CAE solicits original research papers for the July 2023 Edition. Last date of manuscript submission is June 30, 2023.

Read More

Document Office Safety Application using Asimetric Cryptography Algorithm RSA

Susanto. Published in Security.

Communications on Applied Electronics
Year of Publication: 2018
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Susanto

Susanto. Document Office Safety Application using Asimetric Cryptography Algorithm RSA. Communications on Applied Electronics 7(17):1-6, June 2018. BibTeX

	author = {Susanto},
	title = {Document Office Safety Application using Asimetric Cryptography Algorithm RSA},
	journal = {Communications on Applied Electronics},
	issue_date = {June 2018},
	volume = {7},
	number = {17},
	month = {Jun},
	year = {2018},
	issn = {2394-4714},
	pages = {1-6},
	numpages = {6},
	url = {},
	doi = {10.5120/cae2018652770},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Document has an important role in the efficiency of time and work. Document is a media of information storage such as text, images, or graphics. The security aspect of important documents is necessary, unfortunately this aspect is usually ignored, even excluded. This case can cause serious problems and could be harmful to the owner of the document. This study aims to perform document security by using Asymmetric Cryptography Algorithm RSA (Rivest Shamir Adleman).

The design of document security application is using Asymmetric Cryptography Algorithm RSA (Rivest Shamir Adleman). The process of securing documents was done with two types of keys: public keys and private keys that both locks can be set up to 1024 bits or more. The system was built by using Microsoft Visual C# 2010 software. The tests were conducted on thirty-six document samples.

The result which can be obtained from this study indicates that the application of securing office document by using Asymmetric Cryptography RSA ( Rivest Shamir Adleman) algorithm with key length 1024 Bit succeeded in performing keyword generation function by changing the form of number and irregularly arranged random symbols and samples of encrypted documents in the text file format (*.txt).


  1. Ariyus, D. 2008. Pengantar Ilmu Kriptografi: Teori, Analisis, dan Implementasi, Andi, Yogyakarta.
  2. Arief, M. 2015. Kriptografi RSA Pada Aplikasi File Transfer Client-Server Based, Jurnal, Universitas Telkom, Bandung .
  3. Ayushi, 2010, A Symetric Key Cryptographic Algoritm, International Journal of Computer Application, (0975-8887), Volume 1 – No. 15.
  4. Rahman, MM., Akter T., Rahman A., 2016, Development of Cryptiography-Based Secure Messaging System, Journal of Telecommunication System & Management, DOI: 10.4172/2167-0919.1000142.
  5. Refialy, L. 2015. Pengaman Sertifikat Tanah Digital Menggunakan Digital Signature SHA-512 dan RSA, Jurnal, Salatiga : Universitas Kristen SatyaWacana
  6. Wibowo I. 2009. Penerapan Algoritma Kriptografi Asimetris RSA Untuk Keamanan Data Di Oracle, Jurnal, Yogyakarta : Universitas Kristen Duta Wacana.
  7. Kromodimoeljo, S. 2009. Ebook Teori dan Aplikasi KriptografI, Indonesia : SPK IT.
  8. Qiong Huang, Duncan S. Wong. 2008. On the relation among various security models for certificateless cryptography. Int. J. of Applied Cryptography.Vol. 1. No.2.
  9. Sanchita Paul, Tausif Anwar, Abhishek Kumar. 2016. An innovative DNA cryptography technique for secure data transmission. Int. J. of Bioinformatics Research and Applications. Vol. 12. No.3.
  10. Prakash Kuppuswamy, Saeed Q.Y. Al-Khalidi. 2014. Hybrid encryption/decryption technique using new public key and symmetric key algorithm. Int. J. of Information and Computer Security 2014.Vol. 6. No.4.


Application, Cryptography, Document, RSA (Rivest Shamir Adleman)