PENERAPAN METODE SEGITIGA PASCAL ALJABAR UNTUK MEMAKSIMALKAN TEKNIK PENYANDIAN ALGORITMA WORD AUTO KEY ENCRYPTION (WAKE)

Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal

2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

This study combines classic and modern cryptographic algorithms so that the data security of information more awake authenticity. Caesar cipher is the oldest classical cryptography which uses a symmetric key method is the key used for encryption is the same as the key used for the decryption process. Three-Pass Protocol is one of the modern cryptography where the process of sending a message does not need to distribute the key so that each party both the recipient and sender of the message does not need to know each lock. In this combination of receiving and sending messages using the Caesar Cipher algorithm for encryption and decryption, while for its delivery process using algorithms Three Pass protocol. The results from the combination of the two algorithms are to help the information sent is secure.


2017 ◽  
Author(s):  
Robbi Rahim ◽  
Mesran Mesran ◽  
Andysah Putera Utama Siahaan

Information security is very important nowadays, how to secure data certainly requires a technique one of which is the use of cryptography, IDEA algorithm is one of cryptographic algorithms that can be used to secure the message, and in this research IDEA algorithm process is displayed gradually to facilitate the development of IDEA algorithm in various purposes


Author(s):  
Perdana Bagas Tirta Kumbara ◽  
Magdalena A. Ineke Pakereng

Data security is one of the most important factors in the world of Information Technology today. One way to secure data is by Block Cipher Cryptography technique. However, some cryptographic techniques have been successfully solved by the cryptanalysis so that new cryptographic algorithms need to be created. The design of Cryptography algorithms based on traditional game patterns of Rangku Alu from East Nusa Tenggara is a design of Cryptographic Block Cipher algorithms that operate in the form of bits designed with 10 rounds where each cycle contains four processes. In each round there are four patterns for the plaintext process and four patterns for the key. The fourth process is transformed with an S-Box table to get a more random ciphertext. Tests were also carried out using Avalance Effect which reached 49,38% and the correlation value where there was a change in character reached 73,44%. So the result designing Cryptographic algorithms can be used for encryption and description in text files.


Author(s):  
Trisna Setiawaty ◽  
Olven Manahan

Ksecurity wheel is one of the essential needs of the data, or information. With this regard the importance of the information or data by the party or person of interest. This research aims to design and build a system for data security deed of sale that can help the Notary / PPAT. The system was built using the RC4 (Rivest Code 4) which is a symmetric key cryptographic algorithms and is stream cipher, there is a process of encryption and decryption. The encryption is the process of encoding the original message or plaintext into ciphertext encrypted text. While decryption is the process of encoding back to cipherteksmenjadiplainteks (original data). This research resulted in a system that is able to change the data that can be read into the data that is not easily understood.


Author(s):  
Musthofa Galih Pradana ◽  
Pujo Hari Saputro ◽  
Bondan Wahyu Pamekas

<br /><em>Cryptography is widely used to secure data and information so that it is not easily misused by parties who are not interested in the data. One type of cryptographic algorithm is Caesar Cipher and Vigenere Cipher. Both of these algorithms are classic cryptographic algorithms that need to be modified so that they become more optimal in the data security process. The first modification is to modify the Vigenere key using Fibonacci. In general, Vigenere Cipher will repeat the same keyword to complete the number of characters that are lacking so that the number of characters is the same as the number of characters in the plaintext. The second modification is to change or convert plaintext letters into ASCII letters so that the code is more difficult to solve. After the ASCII conversion process is done, the next results will be converted back in Hexa letters. In addition to the two modifications made, the steganography technique is also added by hiding the code behind the media in the form of images. Images that are sampled will be renamed and stored in different places.</em>


2020 ◽  
Vol 1 (2) ◽  
pp. 93-104
Author(s):  
Shabila Fitri Aulia ◽  
Siti Sauda

Technological advances have developed rapidly nowadays. These technological advances are also in line with the development of ways of communicating both orally and in writing. In terms of writing, maintaining aspects of data security and confidentiality is very important. Many technologies can be used to secure data such as cryptography and steganography. This research will use the First of File and End of File Steganography Algorithms to secure data. Steganography is the science of hiding messages or data in the media. The First of File and End of File methods are one of the many methods commonly used in the Steganography Algorithm. Generally, the First of File and End of File methods are not much different. The First of File method inserts a message at the beginning of the file, while End Of File inserts a message at the end of the file. This technology can also be applied again for the years to come. This research produces an overview after a review study of the application of the FOF and EOF steganographic algorithms, the speed of steganography and the differences in the image after steganography in terms of image size and pixel. Kemajuan teknologi sudah sangat berkembang dengan pesat pada era sekarang. Kemajuan teknologi ini juga seiring dengan berkembangnya cara berkomunikasi baik secara lisan maupun tulisan. Dalam hal tulisan, menjaga aspek keamanan dan kerahasiaan data sangatlah penting. Banyak teknologi yang bisa dipakai untuk mengamankan data seperti kriptografi dan steganografi. Penelitian ini akan menggunakan Algoritma Steganografi First Of File dan End Of File untuk mengamankan data. Steganografi merupakan ilmu menyembunyikan pesan atau data ke dalam media. Metode First Of File dan End Of File merupakan salah satu dari banyaknya metode yang biasa digunakan pada Algoritma Steganografi.Umumnya,metodeFirst Of File dan End Of File tidak jauh berbeda. Metode First Of File akan menyisipkan pesan diawal file sedangkan End Of File akan menyisipkan pesan di akhir file. Teknologi ini juga dapat diaplikasikan kembali untuk tahun-tahun kedepannya. Penelitian ini menghasilkan gambaran setalah studi review penerapan algoritma steganografi FOF dan EOF , kecepatan steganografi dan juga perbedaan gambar setelah di steganografi dalam hal ukuran dan pixel gambar.


Author(s):  
Sabitha S ◽  
Binitha V Nair

Cryptography is an essential and effective method for securing information’s and data. Several symmetric and asymmetric key cryptographic algorithms are used for securing the data. Symmetric key cryptography uses the same key for both encryption and decryption. Asymmetric Key Cryptography also known as public key cryptography uses two different keys – a public key and a private key. The public key is used for encryption and the private key is used for decryption. In this paper, certain asymmetric key algorithms such as RSA, Rabin, Diffie-Hellman, ElGamal and Elliptical curve cryptosystem, their security aspects and the processes involved in design and implementation of these algorithms are examined.


Sign in / Sign up

Export Citation Format

Share Document