IMPLEMENTASI METODE MD5 UNTUK MENDETEKSI ORISINALITAS FILE AUDIO

Author(s):  
Sapria Ulandari Lubis

The problem of the originality of the file is about how the file can be maintained its authenticity and ensures that the file has never been changed at all. In this study the object file used is the audio file. The process of manipulating files often occurs during data transmission activities from the sender to the recipient. The solution that can be done to handle the crime of manipulation is to apply a hash type cryptographic technique in which the hash value is encrypted from an audio file that can be used as a keyword to ensure the audio file has never been manipulated or has been manipulated. The hash cryptographic algorithm used is the type of MD5 algorithm. The results obtained from the process of implementing the MD5 algorithm using MATLAB R2010a software and the HASH Pro application are audio file hash codes. Keywords: Implementation, Encryption, Decryption, MD5 Method, Cryptography.

2016 ◽  
Vol 1 (24) ◽  
pp. 485-502
Author(s):  
Abdul Hadi M. Alaidi

The Transfer Control Protocol (TCP) itself does not guarantee the security of data that it transmits. However, under some circumstances, the security of TCP communication is required, e.g. the client-server communication in banking systems. Nowadays, the source socket layer (SSL) protocol is widely used; however, SSL is based on RSA (a public-key cryptographic algorithm) algorithm, which would require more computational resource. Therefore, an alternative faster solution utilizing symmetrical algorithm (AES) are proposed to achieve these goals: bidirectional authentication, encrypted data transmission and Integrity check. Moreover, use the optional fields in TCP header for carrying related information and introduced a new device SAM (Secure access module) which provides security-related functionalities: encryption, decryption, key-diversification etc


Author(s):  
Pinky Saikia Dutta ◽  
Sauvik Chakraborty

Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned both with concealing the fact that a secret message is being sent and its contents. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.


2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Amal Hafsa ◽  
Mohamed Gafsi ◽  
Jihene Malek ◽  
Mohsen Machhout

Securing medical images is a great challenge to protect medical privacy. An image encryption model founded on a complex chaos-based Pseudorandom Number Generator (PRNG) and Modified Advanced Encryption Standard (MAES) is put forward in this paper. Our work consists of the following three main points. First, we propose the use of a complex PRNG based on two different chaotic systems which are the 2D Logistic map in a complex set and Henon’s system in the key generation procedure. Second, in the MAES 128 bits, the subbytes’ operation is performed using four different S-boxes for more complexity. Third, both shift-rows’ and mix-columns’ transformations are eliminated and replaced with a random permutation method which increases the complexity. More importantly, only four rounds of encryption are performed in a loop that reduces significantly the execution time. The overall system is implemented on the Altera Cyclone III board, which is completed with an SD card interface for medical image storage and a VGA interface for image display. The HPS software runs on μClinux and is used to control the FPGA encryption-decryption algorithm and image transmission. Experimental findings prove that the propounded map used has a keyspace sufficiently large and the proposed image encryption algorithm augments the entropy of the ciphered image compared to the AES standard and reduces the complexity time by 97%. The power consumption of the system is 136.87 mw and the throughput is 1.34 Gbit/s. The proposed technique is compared to recent image cryptosystems including hardware performances and different security analysis properties, such as randomness, sensitivity, and correlation of the encrypted images and results prove that our cryptographic algorithm is faster, more efficient, and can resist any kind of attacks.


Author(s):  
Dian Paramita Br Perangin-angin

The authenticity of a digital file is something that must be able to be guaranteed its existence, considering that there are so many devices that can be used to carry out manipulation of the digital file. One of the digital files discussed in this study is an audio file with MP3 file extension. Please note that MP3 audio files are now very easy to obtain, even very easy to manipulate and insert objects in, so we need a safety technique to maintain the authenticity of the audio file. Overcoming the problem that has been explained in the previous paragraph, the appropriate security technique used is the hash cryptographic technique, by applying the CRC 32 algorithm. The application of CRC 32 aims to generate hash codes from MP3 audio files that can be used as key codes for authentication (key authenticity) of MP3 audio files. The results of this study are a representation of the technical explanation of the application of the CRC 32 algorithm in generating MP3 audio file hash codes, which the CRC 32 algorithm is applied to applications that have been designed and built using the help of MATLAB software version 6.1.Keywords: File Authenticity, Audio File, CRC 32, MATLAB 6.1


2015 ◽  
Vol 14 (12) ◽  
pp. 6361-6367 ◽  
Author(s):  
Ari Shawkat Tahir

RSA cryptographic algorithm used to encrypt and decrypt the messages to send it over the secure transmission channel like internet.  The RSA algorithm is a secure, high quality, public key algorithm. In this paper, a new architecture and modeling has been proposed for RSA public key algorithm, the suggested system uses 1024-bit RSA encryption/decryption for restricted system. The system uses the multiply and square algorithm to perform modular operation. The design has been described by VHDL and simulated by using Xilinx ISE 12.2 tool. The architectures have been implemented on reconfigurable platforms FPGAs. Accomplishment when implemented on Xilinx_Spartan3 (device XC3S50, package PG208, speed -4) which confirms that the proposed architectures have minimum hardware resource, where only 29% of the chip resources are used for RSA algorithm design with realizable operating clock frequency of 68.573 MHz.


2021 ◽  
Vol 5 (3) ◽  
pp. 483-488
Author(s):  
Cinantya Paramita ◽  
Usman Sudibyo

Mp3 is one form of audio file extension that is widely used today. With a variety of uses in a variety of mp3 systems become one of the audio extensions that are commonly found in technology systems of the Internet of Things era. However, with the many uses of the .mp3 file extension, there is a new problem, namely the security of the data itself. From these problems, the author aims to examine the security of the mp3 file by designing cryptographic science-based applications. The cryptographic algorithm used in the application is a combination of the asymmetric RSA 2048 algorithm and symmetric columnic transpositions. RSA 2048 algorithm was chosen because it has a key length in accordance with NIST standards in securing data. By combining the two algorithms, the application system will have the ability to manage mp3 files and encrypt mp3 files with the results of data that cannot be played like mp3 files in general. This application system will be developed by prototype method which is the best method in developing a system with trial and error in algorithm development.  


2020 ◽  
Vol 8 (6) ◽  
pp. 3463-3471

Vehicular ad hoc networks (VANETs) is an Intelligent Transportation System and a part of MANETS. VANETs communication is wireless between vehicles and different nodes along the road to increase efficiency and human safety. VANETs embedded all the features of MANETs and almost any Ad Hoc Network. We have discussed various features of VANET and different types of attacks, since the VANET communication is open in nature; they are prone to various types of attacks. Although various attractive features, VANETs also face some challenges like communication with different types of nodes and sensors and gather information or data. Our major focus is on securing this data or information sent by the sender node before transmitting on the network to another node in the network. We intend to solve this by using a wireless LoRa module and cryptography algorithm like ECDH for secure data transmission and solve the security risks and privacy problems. Our work discusses VANET communication method and structure. We provide a simple communication method using P2P topology method and ECDH cryptographic algorithm for keeping the data secure.


2018 ◽  
Vol 1 (1) ◽  
pp. 069-077
Author(s):  
Ananda Dwi Putri ◽  
Dian Rachmawati ◽  
Heriyance Heriyance

Komunikasi dan bertukar informasi secara jarak jauh sudah sangat mudah dan praktis. Kemudahan ini menuntut peningkatan keamanan terhadap kerahasiaan data yang dikirim. Kriptografi adalah salah satu cara yang digunakan untuk menjaga kerahasian dari sebuah pesan, dimana pesan disamarkan menjadi sandi. Selain keamanan data yang perlu diperhatikan juga adalah kecepatan dalam pengiriman data tersebut. Kecepatan pengiriman ini tergantung dari ukuran informasi tersebut. Kompresi adalah proses pengubahan sekumpulan data menjadi bentuk kode dengan tujuan untuk menghemat kebutuhan tempat penyimpanan dan waktu untuk transmisi data. Dalam penelitian ini penulis mengkombinasi algoritma kriptografi Playfair Cipher dengan algoritma kompresi Run Length Encoding, serta menganalisa kedua algoritma menggunakan kompleksitas algoritma. waktu eksekusi pesan dengan 16 karakter adalah 0.54423 sekon, waktu eksekusi pesan dengan 78 karakter adalah 1.14617 sekon, dan waktu eksekusi pesan dengan 189 karakter adalah 1.51715 sekon. Hasil pengujian proses kompresi string Homogen dengan kompresi rasio rata-rata sebesar 33.83% dan sring Heterogen dengan kompresi rasio rata-rata sebesar 15,54%. Dapat disimpulkan jumlah karakter pada pesan berbanding lurus terhadap waktu. Communication and exchanging information remotely are very easy and practical. This convenience requires increased security against the confidentiality of the data sent. Cryptography is one way used to maintain the confidentiality of a message, where the message is disguised as a password. In addition to data security, the speed in sending the data also needs to be considered. This speed of delivery depends on the size of the information. Compression is the process of converting a set of data into a code form with the aim of saving storage needs and time for data transmission. In this study, the researcher combined the Playfair Cipher cryptographic algorithm with the Run Length Encoding compression algorithm and analyzed both algorithms using algorithmic complexity. Message execution time with 16 characters was 0.54423 seconds. Message execution time with 78 characters was 1.14617 seconds, and message execution time with 189 characters was 1.51715 seconds. The result test was an average of 33.83% for the Homogeneous string compression process with compression ratios, and 15.54% for the Heterogeneous string with compression ratios. It could be concluded that the number of characters in the message was directly proportional to time. 


Author(s):  
Dhirendra Bagri ◽  
Shashikant Rathore

Objective: Smart grid is an entity which dwells on a network of Energy Transmission with Integrated data transmission it works for flow of energy and Transmission of data that is generated by the stakeholders and in return it provides them the required electricity without any hurdles or disturbance. The versatility and integrity of entire network completely rely on the truthful data which gets floated from variety of distributed users in the network. There is a huge chance to get attacked through hijacking of smart communication network. Another concern remains raised about unable to use the existing security algorithm due to the enormous amount of data that gets generated in the distributed environment. So, these issues facilitate to work on designing the security algorithm for providing better security and better efficiency in smart meter communication. Methods: This paper is presented with proposed model with enhanced security that not just only encrypt the enormous amount of data but also it does the work of encryption in very less time. The proposed algorithm is based on bi-key computational algorithm where two different entities are used as keys, with the use of this algorithm the task of finding the original data gets transformed into NP hard problem. Results: The Proposed algorithm is analyzed with existing cryptographic algorithm and found more secure and provide better performance. Conclusion: This paper presents simulated results obtained in MATLAB which Justify the adaptability and acceptability of proposed algorithms for enormous generated data.


2010 ◽  
Vol 10 (03) ◽  
pp. 327-341 ◽  
Author(s):  
P. KARTHIGAIKUMAR ◽  
K. BASKARAN

Information security has always been important in all aspects of life as technology controls various operations. Cryptography provides a layer of security in cases where the medium of transmission is susceptible to interception, by translating a message into a form that cannot be read by an unauthorized third party. All non-quantum transmission media known today are capable of being intercepted in one way or another. This paper seeks to implement a novel partial pipelined, robust architecture of Blowfish algorithm in hardware. Blowfish algorithm has no known cryptanalysis. The best proven attack against Blowfish till date is an exhaustive brute-force attack. This makes Blowfish an attractive cryptographic algorithm since it is not susceptible to any reasonable attack. The hardware implementation of Blowfish would be a powerful tool for any mobile device, or any technology requiring strong encryption. The proposed design uses the core_slow library for worst-case scenario analysis and attains an incredible encryption speed of 2670 MBits/sec and decryption speed of 2642 MBits/sec. The area is 5986 LUT's and the power is a mere 77 mW.


Sign in / Sign up

Export Citation Format

Share Document