Abstract
Several agencies, both government and private, require the security of personal data, especially as this information can only be accessed or transmitted to authorized people or organizations. Likewise with license and regulatory records, these materials are exceedingly confidential. Documents pertaining to permissions and regulations issued by aviation authorities, such as operating permits and aircraft certification, However, the difficulty is that when data is distributed using an internet connection, it can slip into the hands of unscrupulous people. Implementation of the Asymmetric Fountain Code Algorithm to safeguard confidential text data is used to safeguard license and regulatory document data with encryption and description methods using the Fountain Code Algorithm, which has two keys to access plaintext and ciphertext documents using SharpDevelop 5.1 software in the C# language. This research reveals that the outputs of the Fountain Code algorithm can restore plaintext data in its entirety. So it can be inferred that the asymmetric Fountain Code algorithm meets good data integrity and is safe; the complexity of the algorithm is simpler; and the amount of plaintext is exactly related to time.
Reference24 articles.
1. W. W. Widiyanto, D. Iskandar, S. Wulandari, E. Susena, and E. Susanto, “Implementation Security Digital Signature Using Rivest Shamir Adleman (RSA) Algorithm As A Letter Validation And Distribution Validation System,” in 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), 2022, pp. 599–605.
2. N. P. Douglass, J. Langel, W. J. Moore, L. Ng, R. M. Dudukovich, and S. Mal-Sarkar, “Application of Fountain Code to High-rate Delay Tolerant Networks,” IEEE Access, 2023.
3. J. Juhari and M. F. Andrean, “On the application of noiseless steganography and elliptic curves cryptography digital signature algorithm methods in securing text messages,” CAUCHY J. Mat. Murni dan Apl., vol. 7, no. 3, pp. 483–492, 2022.
4. A. Hamza and B. Kumar, “A review paper on DES, AES, RSA encryption standards,” in 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), 2020, pp. 333–338.
5. J. Jamaludin and R. Romindo, “Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security,” IJISTECH (International J. Inf. Syst. Technol., vol. 4, no. 1, pp. 471–481, 2020.