scholarly journals Rancang Bangun Sistem Keamanan RFID Tag menggunakan Metode Caesar Cipher pada Sistem Pembayaran Elektronik

Author(s):  
DECY NATALIANA ◽  
FEBRIAN HADIATNA ◽  
AHMAD FAUZI

ABSTRAKPada penelitian ini mencoba untuk memanfaatkan tag RFID sebagai media untuk menyimpan data berupa nilai nominal uang. Metode enkripsi data Ceasar Cipher akan diterapkan ke dalam sistem yang dirancang sehingga data nominal uang pada tag merupakan data yang terenkripsi. Enkripsi data ini dilakukan untuk memperkuat sistem keamanan yang telah terdapat pada tag, sehingga proses peretasan data akan lebih sulit untuk dilakukan. Perangkat keras yang digunakan untuk merealisasikan sistem terdiri dari unit reader RFID-RC522, tag MIFARE Classic S50 1 kbyte, dan Arduino UNO R3. Dari hasil pengujian diperoleh bahwa tag dapat digunakan untuk menyimpan data berupa nilai nominal uang dan dari sistem yang telah direalisasikan nilai nominal uang tersebut dapat ditambah atau dikurang jumlahnya dari Rp 0 – Rp 4.294.967.295. Penerapan metode Ceasar Cipher berhasil mengubah nilai nominal uang menjadi data yang terenkripsi.Kata Kunci: RFID, pembayaran elektronik, sistem keamanan, enkripsi data, ceasar cipher ABSTRACTIn this research will try to utilize RFID tag as data storage for a certain value of money. Ceasar cipher as encryption method will be applied to the implemented system so that this certain value of money inside the tag turned into an encrypted data. Ecryption of the data is done to hardened the security sistem that already exists in the tag itself, so any violation behavior like data cracking will be harder to accomplish. The hardware that used on the system consist of a reader unit RFID-RC522, MIFARE Classic tag S50 1kbyte, and Arduino UNO R3. The result of this research proofed that the tag could be utilized to store a certain value of money and with a well built implemented system, the data value could be incremented or decremented ranging from Rp 0 – Rp 4.294.967.295. Implementation of Ceasar Cipher method has succesfully turn that certain value of money inside the tag into an encrypted data.Keywords: RFID, Electronic payment, security system, data encryption, ceasar cipher

2019 ◽  
Vol 13 ◽  
pp. 174830261987359
Author(s):  
Xi Liu ◽  
Baolin Hou ◽  
Qiangqiang Zhao

A novel data encryption method is presented for howitzer shell transfer arm using chaos and compressive sensing. Data are stored in the embedded fault diagnosis machine using chaos and compressive sensing, so the encrypted data are more secure in the embedded system and in the process of transmission with host computer. When the host computer extracts the operation data of the howitzer shell transfer arm monitored by the fault diagnosis machine, firstly, the encrypted data in the embedded diagnostic machine are read, then decrypted, and then the original signal is reconstructed by the orthogonal matching pursuit algorithm for further analysis and processing. The similarity degree between the reconstructed data and the original data is 0.947, the key space of the algorithm is [Formula: see text], and the algorithm is sensitive to the key. The result shows that the method can effectively save a large number of confidential data.


Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 4
Author(s):  
Bayan Alabdullah ◽  
Natalia Beloff ◽  
Martin White

Data security has become crucial to most enterprise and government applications due to the increasing amount of data generated, collected, and analyzed. Many algorithms have been developed to secure data storage and transmission. However, most existing solutions require multi-round functions to prevent differential and linear attacks. This results in longer execution times and greater memory consumption, which are not suitable for large datasets or delay-sensitive systems. To address these issues, this work proposes a novel algorithm that uses, on one hand, the reflection property of a balanced binary search tree data structure to minimize the overhead, and on the other hand, a dynamic offset to achieve a high security level. The performance and security of the proposed algorithm were compared to Advanced Encryption Standard and Data Encryption Standard symmetric encryption algorithms. The proposed algorithm achieved the lowest running time with comparable memory usage and satisfied the avalanche effect criterion with 50.1%. Furthermore, the randomness of the dynamic offset passed a series of National Institute of Standards and Technology (NIST) statistical tests.


Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


2017 ◽  
Vol 7 (1.1) ◽  
pp. 64 ◽  
Author(s):  
S. Renu ◽  
S.H. Krishna Veni

The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 


2019 ◽  
Vol 8 (1) ◽  
pp. 13-19
Author(s):  
Meli Mildawati ◽  
Wildian Wildian

Sistem pengaman sepeda motor menggunakan radio frequency identification (RFID) dan notifikasi melalui handphone yang dikontrol dengan modul Arduino Uno telah dirancang bangun. RFID terdiri dari sebuah RFID tag dan RFID reader. RFID tag yang memiliki kode yang berbeda-beda, digunakan sebagai kunci untuk menghidupkan sepeda motor setelah kunci kontak digunakan. RFID reader dapat membaca tag pada jarak maksimal 1,26 cm. Sepeda motor yang dihidupkan tanpa menggunakan RFID tag atau RFID tag tidak sesuai menyebabkan aktifnya reed switch pada pelek roda depan. Ketika roda telah berputar sebanyak empat kali, maka alarm aktif dan GSM SIM 800L mengirimkan notifikasi berupa SMS sebanyak satu kali dan misscall sebanyak tiga kali ke nomor handphone pemilik sepeda motor. Waktu delay rata-rata SMS dan miscall berturut-turut adalah 5,42 s, 8,62 s, 61,14 s dan 113,16 s. Kata kunci: sistem pengaman sepeda motor, RFID, Arduino Uno , reed switch, GSM SIM 800L


Author(s):  
Tawfiq Barhoom ◽  
Mahmoud Abu Shawish

Despite the growing reliance on cloud services and software, privacy is somewhat difficult. We store our data on remote servers in cloud environments that are untrusted. If we do not handle the stored data well, data privacy can be violated with no awareness on our part. Although it requires expensive computation, encrypting the data before sending it appears to be a solution to this problem. So far, all known solutions to protect textual files using encryption algorithms fell short of privacy expectations. Thus is because encrypting cannot stand by itself. The encrypted data on the cloud server becomes full file in the hand causing the privacy of this data to be intrusion-prone, thus allowing intruders to access the file data once they can decrypt it. This study aimed to develop an effective cloud confidentiality model based on combining fragmentation and encryption of text files to compensate for reported deficiency in encryption methods. The fragmentation method used the strategy of dividing text files into two triangles through the axis. Whereas the encryption method used the Blowfish algorithm. The research concluded that high confidentiality is achieved by building a multi-layer model: encryption, chunk, and fragmentation of every chunk to prevent intruders from reaching the data even if they were able to decrypt the file. Using the privacy accuracy equation (developed for the purpose in this research), the model achieved accuracy levels of 96% and 90% when using 100 and 200 words in each chunk on small, medium, and large files respectively.


2007 ◽  
Vol 46 (6B) ◽  
pp. 3775-3781 ◽  
Author(s):  
Mitsuru Toishi ◽  
Masaaki Hara ◽  
Kenji Tanaka ◽  
Tomiji Tanaka ◽  
Kenjiro Watanabe

Sign in / Sign up

Export Citation Format

Share Document