Implementasi Enkripsi dan Otentikasi Transmisi Data ZeroMQ Menggunakan Advanced Encryption Standard

Author(s):  
I Made Sukarsa ◽  
I Made Rama Pradana ◽  
Putu Wira Buana

Communication via sockets is used to transmit information between applications or between processes over network or locally. ZeroMQ is a library for sending messages using sockets that are quite well known. Talking about sending data, message security is an important part that needs to be taken into account, especially when sending data over a network. ZeroMQ sends messages openly without securing the messages sent. This is evidenced by research which states that ZeroMQ does not have a security layer for sending messages over the network and direct observation of message packets using the wireshark application. Therefore, this study creates a method of securing and authenticating message delivery using AES (Advanced Encryption Standard) CBC (Cipher Block Chaining) mode combined with an authentication method. The AES CBC mode was chosen because it is faster than other methods and has strong encryption. This encryption and authentication are used so that the sender and recipient of the message are both valid senders and recipients so that no message changes during message delivery and messages can only be opened by the message recipient and the sender of the message. Tests are conducted to measure the effect of encryption and authentication on message delivery performance. Based on the tests conducted, there is an increase of 7% from normal delivery speed and the potential for messages is not up to 0.3% - 1.5%.

Author(s):  
Jessy Ayala

The focus of this research is to analyze the results of encrypting audio using various authenticated encryption algorithms implemented in the Python cryptography library for ensuring authenticity and confidentiality of the original contents. The Advanced Encryption Standard (AES) is used as the underlying cryptographic primitive in conjunction with various modes including Galois Counter Mode (GCM), Counter with Cipher Block Chaining Message Authentication Code (CCM), and Cipher Block Chaining (CBC) with Keyed-Hashing for encrypting a relatively small audio file. The resulting encrypted audio shows similarity in the variance when encrypting using AES-GCM and AES-CCM. There is a noticeable reduction in variance of the performed encodings and an increase in the amount of time it takes to encrypt and decrypt the same audio file using AES-CBC with Keyed-Hashing. In addition, the corresponding encrypted using this mode audio spans a longer duration. As a result, AES should either have GCM or CCM for an efficient and reliable authenticated encryption integration within a workflow.


2021 ◽  
Vol 6 (2) ◽  
pp. 54-61
Author(s):  
Lekso Budi Handoko ◽  
Andi Danang Krismawan

The increase in significant advances in information technology greatly provides comfort and convenience in managing data. This convenience is what makes people who are not responsible for using it as a crime such as hacking, cracking, phishing, and so on. In Telkom Region 4 Semarang, there is a container where there are important company data such as customer data. Customer data is very important and the contents of the data must be kept confidential. The company has experienced significant losses due to information leakage due to negligence in the last 5 years. For this reason, data security is necessary so that data is safe and is not misused. This study applies the Advance Encryption Standard algorithm - Cipher Block Chaining (AES-CBC) and Stream cipher in order to secure data so as to reduce the risk of data theft by telecom subscribers. Based on the average avalanche effect value of AES-CBC and a stream cipher of 49.34%, this shows that the AES-CBC and Stream Cipher encrypted files are difficult to crack so that data confidentiality is well maintained.


Author(s):  
Sachin Pandurang Godse ◽  
Parikshit N. Mahalle

Vehicle ad hoc networks face the challenging issue of vehicle communication and its security. So, these issues become key research topics for global VANET researchers. Researcher's current solutions mostly focus on either of the problems but currently they are now heading towards finding satisfactory solutions for both of the above-mentioned problems. VANET networks should be robust and strongly dependent on their communication rapidness, message authentication, priority messaging, and security. Here, the authors discuss four VANET issues: authentication delays, fake messages, priority-based messaging, and VANET security, with respective solutions. This article presents an enhanced ECC-based algorithm to minimize authentication delays and provide secure VANET. Result analysis shows that the algorithm is effective in reducing the authentication delays and improves communication rapidness, improves the security model operation to detect Sybil and reply attack, and promotes intelligent message forwarding to block fake messages and increases message delivery performance.


2015 ◽  
Vol 7 (3) ◽  
pp. 52
Author(s):  
Farzana Yasmeen ◽  
Uyen Trang Nguyen ◽  
Nurul Huda ◽  
Shigeki Yamada ◽  
Cristian Borcea

Delay-tolerant networks (DTNs) can tolerate disruption on end-to-end paths by taking advantage of temporal links emerging between nodes as nodes move in the network. Intermediate nodes store messages before forwarding opportunities become available. A series of encounters (i.e., coming within mutual transmission range) among different nodes will eventually deliver the message to the desired destination. The message delivery performance in a DTN (such as delivery ratio and end-to-end delay) highly depends on the time elapsed between encounters and the time two nodes remain in each others communication range once a contact is established. As messages are forwarded opportunistically among nodes, it is important to have sufficient contact opportunities in the network for faster, more reliable delivery of messages. We propose a simple yet efficient method for improving the performance of a DTN by increasing the contact duration of encountered nodes (i.e., mobile devices). Our proposed sticky transfer framework and protocol enable nodes in DTNs to collect neighbors’ information, evaluate their movement patterns and amounts of data to transfer in order to make decisions of whether to “stick” with a neighbor to complete the necessary data transfers. The sticky transfer framework can be combined with any DTN routing protocol to improve its performance. We evaluate ourframework through simulations and measure several network performance metrics. Simulation results show that the proposed framework can improve the message delivery ratio, end-to-end delay, overhead ratio, buffer occupancy, number of disrupted message transmissions and so on. It can be well adopted for challenged scenarios where larger messages sizes need to be delivered with application deadline constraints. Furthermore, performance of the DTN improved (upto 43%) at higher node densities and (up to 49%) under increased mobility conditions.


Author(s):  
Jorge Herrera-Tapia ◽  
Enrique Hernández-Orallo ◽  
Andrés Tomas ◽  
Pietro Manzoni ◽  
Carlos T. Calafate ◽  
...  

2017 ◽  
Vol 10 (13) ◽  
pp. 441
Author(s):  
G.s.r. Emilselvan ◽  
N. Gayathri ◽  
S Rakesh Kumar ◽  
Ankush Rai ◽  
Jagadeesh Kannan R

Wireless networking technology is becoming increasingly popular but, at the same time, has introduced many security issues. WEP standards are followed in WLANs for providing security. But WEP is fatally crippled by the fact that WEP keys are the same for all users, all sessions and never changes and its poor implementation of the RC4 encryption scheme. The authentication mechanism is based on a  simple challenge-response protocol. The main problem with the previously used method was same key was used for both encryption and authentication. But the proposed authentication is by means of certificates using Extensible Authentication Protocol and a session key is transferred after successful authentication between mobile node and server. This session key is then used for encrypting messages using Advanced Encryption Standard between mobile node and server.


2021 ◽  
Vol 11 (1) ◽  
pp. 6-11
Author(s):  
Achmad Sudrajat ◽  
Yoyok Heru Prasetyo ◽  
Mila Kusumawardani

Robot humanoid adalah robot yang memiliki bentuk seperti manusia yaitu memiliki tubuh dan kepala, dua tangan dan dua kaki yang memungkinkan dapat bergerak dan berinteraksi dengan lingkungan yang dibuat oleh manusia [1]. Pada sistem robot sepak bola humanoid yang digunakan saat ini masih menggunakan sistem Robot Operating System (ROS) saja, yang pada dasarnya di dalam sistem tersebut tanpa ada enkripsi atau pengaman data setiap kali komunikasi dilakukan dengan pengiriman dan permintaan atau yang biasa disebut Publish dan Subscribe. Dalam rangka pengembangan robot sepak bola humanoid, penelitian ini dirancang untuk “Implementasi Enkripsi Advanced Encryption Standard (AES-128) Mode Cipher Block Chaining (CBC) Sebagai Keamanan Komunikasi Pergerakan Robot Humanoid KRSBI”. Yang didesain untuk beroperasi pada konektivitas dengan kualitas yang rendah, dengan network bandwidth yang mengamankan setiap node yang berjalan di dalam ROS yang didalamnya terdapat fitur untuk subscribe topik dan juga publish topik. Kemudian dengan tambahan kriptografi dapat menjaga agar data atau pesan tetap aman saat dikirimkan, dari pengirim ke penerima tanpa mengalami gangguan dari pihak ketiga. Menurut Bruce Scheiner dalam bukunya "Applied Cryptography", kriptografi adalah ilmu pengetahuan dan seni menjaga message- message agar tetap aman (secure). [2] Maka semua komunikasi dienkripsi dengan menggunakan Secure Sockets Layer (SSL), atau lebih spesifiknya Transport Layer Security (TLS).


Author(s):  
R. W. Anderson ◽  
D. L. Senecal

A problem was presented to observe the packing densities of deposits of sub-micron corrosion product particles. The deposits were 5-100 mils thick and had formed on the inside surfaces of 3/8 inch diameter Zircaloy-2 heat exchanger tubes. The particles were iron oxides deposited from flowing water and consequently were only weakly bonded. Particular care was required during handling to preserve the original formations of the deposits. The specimen preparation method described below allowed direct observation of cross sections of the deposit layers by transmission electron microscopy.The specimens were short sections of the tubes (about 3 inches long) that were carefully cut from the systems. The insides of the tube sections were first coated with a thin layer of a fluid epoxy resin by dipping. This coating served to impregnate the deposit layer as well as to protect the layer if subsequent handling were required.


Sign in / Sign up

Export Citation Format

Share Document