Aplikasi Enkripsi Citra Menggunakan Algoritma Kriptografi Arnold Cat Map Dan Logistic Map

Author(s):  
Pahrul Irfan

Data security in the process of information exchange is very important. One way to secure the image is to use cryptographic techniques. Cryptographic algorithms applied to the image is used to randomize the position of pixels using a secret key parameters, so that images can not be recognized anymore after the encryption process. In this study, researchers used the algorithm of chaos known as algorithms compact, fast and commonly used in cryptography especially those in the image file. The results showed the image that has been through an encryption process can not be recognized because the randomization process image pixel position is performed using chaosalgorithm.

Author(s):  
Perdana Bagas Tirta Kumbara ◽  
Magdalena A. Ineke Pakereng

Data security is one of the most important factors in the world of Information Technology today. One way to secure data is by Block Cipher Cryptography technique. However, some cryptographic techniques have been successfully solved by the cryptanalysis so that new cryptographic algorithms need to be created. The design of Cryptography algorithms based on traditional game patterns of Rangku Alu from East Nusa Tenggara is a design of Cryptographic Block Cipher algorithms that operate in the form of bits designed with 10 rounds where each cycle contains four processes. In each round there are four patterns for the plaintext process and four patterns for the key. The fourth process is transformed with an S-Box table to get a more random ciphertext. Tests were also carried out using Avalance Effect which reached 49,38% and the correlation value where there was a change in character reached 73,44%. So the result designing Cryptographic algorithms can be used for encryption and description in text files.


2020 ◽  
Vol 7 (3) ◽  
pp. 409
Author(s):  
Saripah Aini

Data security is one of the most important aspects in information technology. With a high level of security, hopefully the information presented can be maintained its authenticity. In this final project a system that secures data and information stored on the computer from cryptanalysts is formed. The steps that the author did to make the process of forming the system include the stages of problem analysis, algorithm and flowchart along with modeling the structure of the program and design of the application interface, so that the application formed becomes easy to use and has optimal functions. By using TEA and pontifex algorithms which are secret key cryptographic algorithms, these problems can be overcome. The strength of this algorithm lies in the feistel network (including substitution operations, permutations and modular arithmetic) and delta numbers derived from the golden number.


Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


2022 ◽  
Vol 54 (9) ◽  
pp. 1-37
Author(s):  
Asma Aloufi ◽  
Peizhao Hu ◽  
Yongsoo Song ◽  
Kristin Lauter

With capability of performing computations on encrypted data without needing the secret key, homomorphic encryption (HE) is a promising cryptographic technique that makes outsourced computations secure and privacy-preserving. A decade after Gentry’s breakthrough discovery of how we might support arbitrary computations on encrypted data, many studies followed and improved various aspects of HE, such as faster bootstrapping and ciphertext packing. However, the topic of how to support secure computations on ciphertexts encrypted under multiple keys does not receive enough attention. This capability is crucial in many application scenarios where data owners want to engage in joint computations and are preferred to protect their sensitive data under their own secret keys. Enabling this capability is a non-trivial task. In this article, we present a comprehensive survey of the state-of-the-art multi-key techniques and schemes that target different systems and threat models. In particular, we review recent constructions based on Threshold Homomorphic Encryption (ThHE) and Multi-Key Homomorphic Encryption (MKHE). We analyze these cryptographic techniques and schemes based on a new secure outsourced computation model and examine their complexities. We share lessons learned and draw observations for designing better schemes with reduced overheads.


2020 ◽  
Vol 1 (1) ◽  
pp. 11-22
Author(s):  
Asaad A. Hani

There is a great research in the field of data security these days. Storing information digitally in the cloud and transferring it over the internet proposes risks of disclosure and unauthorized access; thus, users, organizations, and businesses are adapting new technology and methods to protect their data from breaches. In this paper, we introduce a method to provide higher security for data transferred over the internet, or information based in the cloud. The introduced method for the most part depends on the Advanced Encryption Standard (AES) algorithm, which is currently the standard for secret key encryption. A standardized version of the algorithm was used by The Federal Information Processing Standard 197 called Rijndael for the AES. The AES algorithm processes data through a combination of exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and MixColumn operations. The fact that the algorithm could be easily implemented and run on a regular computer in a reasonable amount of time made it highly favorable and successful. In this paper, the proposed method provides a new dimension of security to the AES algorithm by securing the key itself such that even when the key is disclosed; the text cannot be deciphered. This is done by enciphering the key using Output Feedback Block Mode Operation. This introduces a new level of security to the key in a way, in which deciphering the data requires prior knowledge of the key and the algorithm used to encipher the key for the purpose of deciphering the transferred text.


2021 ◽  
Vol 5 (6) ◽  
pp. 1113-1119
Author(s):  
Muhammad Fadlan ◽  
Haryansyah ◽  
Rosmini

One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly used, namely substitution techniques and transposition techniques. One of the weaknesses of the basic cryptographic techniques is the lower level of data security. This study proposed a super encryption model in securing data by combining cryptographic algorithms with substitution techniques, i.e., autokey cipher and transposition, i.e., columnar transposition cipher. This study used the Avalanche Effect method as a measurement tool for the proposed super encryption model. The test results have shown that the proposed super encryption model can provide a better level of security. The avalanche effect test on the five data test shows that the average AE value of the proposed super encryption model is 30.76%. This value is higher than the single autokey cipher algorithm of 1.66% and column transposition with a value of 18.03%. Other results from the five data test have shown that the proposed model has a high level of accuracy of 100% in terms of the decryption process results, which is the same as the initial data before going through the encryption process.  


Sign in / Sign up

Export Citation Format

Share Document