scholarly journals Implementasi Algoritma Vigeneere Cipherdan GOSTdalam Keamanan Data

2018 ◽  
Author(s):  
Irfan

The exchange of information data in cyberspace is very much done today and very vulnerable to the danger of abuse and tapping by irresponsible parties due to the weakness of the security process. Action abuse when exchanging information can be solved by using cryptographic techniques. Cryptography itself has a variety of algorithms, such as vigeneee cipher, hill cipher, GOST, AES and others. Cryptographic techniques can secure data in the form of text with the process of encryption and deskrpsi so that data will be safe. GOST algorithm is also the same use with vigenere cipher algorithm. This study describes the combination of these two algorithms in securing secret or important text type data. Text type data security based on the combination of these two methods is done by encrypting the data first based on the vigeneere cipher algorithm, then the cipher vigenaerediencryption back based on the GOST algorithm, resulting in the cipherakhir completely random. Combination of these two methods is expected to be used as one solution in optimizing data security, especially confidential data.

Author(s):  
Pratiksha Satapure

Abstract: Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vital information in a secret way. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, nonrepudiation. The security of communication is a crucial issue on World Wide Web. It is about confidentiality, integrity, authentication during access or editing of confidential internal documents. Keywords: Cryptography, Hill Cipher, Homophonic Substitution Cipher, Monoalphabetic Cipher, Ceaser Cipher.


Author(s):  
Perdana Bagas Tirta Kumbara ◽  
Magdalena A. Ineke Pakereng

Data security is one of the most important factors in the world of Information Technology today. One way to secure data is by Block Cipher Cryptography technique. However, some cryptographic techniques have been successfully solved by the cryptanalysis so that new cryptographic algorithms need to be created. The design of Cryptography algorithms based on traditional game patterns of Rangku Alu from East Nusa Tenggara is a design of Cryptographic Block Cipher algorithms that operate in the form of bits designed with 10 rounds where each cycle contains four processes. In each round there are four patterns for the plaintext process and four patterns for the key. The fourth process is transformed with an S-Box table to get a more random ciphertext. Tests were also carried out using Avalance Effect which reached 49,38% and the correlation value where there was a change in character reached 73,44%. So the result designing Cryptographic algorithms can be used for encryption and description in text files.


2020 ◽  
Vol 2 (1) ◽  
pp. 25-34
Author(s):  
Yhopi Suhelna

Humans interact with fellow humans using communication. Not everything that is communicated contains a message so that it can be known by many people, sometimes the communication is confidential so that only certain people can know it. The occurrence of data tapping submitted is certainly a problem if the data is confidential, therefore a data security system is needed so that the data cannot be stolen or changed by tappers or crackers. One solution to secure data is to use cryptography. Cryptography is the science and art of maintaining message security when messages are sent from one media to another without experiencing interference from third parties. Through cryptographic techniques, data can be changed into passwords that are not understood and return them back to the original, this process is called data encryption and decryption. This data security process uses the Digraph Cipher method. Some facilities in the Digraph Cipher method are the keys used in the encryption and decryption process are the same (symmetrical) and the decryption process is the opposite of the encryption process.


Author(s):  
Rama Aria Megantara ◽  
Fauzi Adi Rafrastara ◽  
Syafrie Naufal Mahendra

The progress of the development of digital technology today, many people communicate by sending and receiving messages. However, along with extensive technological developments, many crimes were committed. In avoiding these crimes, data security needs to be done. Form of data security in the form of cryptography and steganography. One of the cryptographic techniques is the hill cipher algorithm. Hill ciphers include classic cryptographic algorithms that are very difficult to solve. While the most popular steganography technique is Least Significant Bit (LSB). Least Significant Bit (LSB) is a spatial domain steganography technique using substitution methods. This study discusses the merging of message security with hill cipher and LSB. The message used is 24-bit color image for steganography and text with 32, 64 and 128 characters for cryptography. The measuring instruments used in this study are MSE, PSNR, Entropy and travel time (CPU time). Test results prove an increase in security without too damaging the image. This is evidenced by the results of the MSE trial which has a value far below the value 1, the PSNR is> 64 db, the entropy value ranges from 5 to 7 and the results of travel time <1 second.


Author(s):  
Agung Agung ◽  
Nono Heryana ◽  
Arip Solehudin

The progress of communication technology has had a positive impact on human life, including in the field of education. The education office is currently implementing computer-based exams starting from the State Higher Education Entrance Joint Selection (SBMPTN) exam to the School Final Examination. But with the implementation of computer-based exams this is of course the less secure the level, therefore the authors make this research with the aim of securing the exam data that will be tested with Hill cipher cryptography and Caesar cipher. Cryptography is a technique of hiding data that is done to secure data, in this case cryptography aims to secure data on exam questions.


Author(s):  
Anitha K L ◽  
T.R. Gopalakrishnan Nair

<span>The cloud computing had its impact far and wide, and Enterprise solutions are getting migrated to different types of clouds. The services are delivered from the data centers which are located all over the world. As the data is roaming with less control in any data centers, data security issues in cloud are very challenging. Therefore we need multi-level authentication, data integrity, privacy and above all encryption to safeguard our data which is stored on to the cloud. The data and applications cannot be relocated to a virtual server without much degree of security concern as there can be much confidential data or mission-critical applications. In this paper, we propose Data Storage Lock Algorithm (DSLA) to store confidential data thereby provides secure data storage in cloud computing based on cryptographic standards.</span>


2021 ◽  
Vol 3 (1) ◽  
pp. 8-13
Author(s):  
Muhammad Azmi ◽  
Zulkarnaen Zulkarnaen

The security and confidentiality of a message or document sent to other people must be guaranteed its confidentiality and security, so that the message or document is not misused by parties who do not have an interest in the message. Security and confidentiality of messages or documents can be kept confidential and secure by using cryptography. data security and confidentiality issues are very important from an information. Because of the importance of this information, the person concerned will question whether the authenticity of the information is still maintained or whether the information has been hijacked. So in the process of securing data and information with cryptography, of course it requires a qualified algorithm to maintain the confidentiality of the information, so that the purpose of this research is how to maintain the confidentiality of information by converting information into codes known only to the sender and receiver by using cryptographic techniques and steganography. Then the process of securing the data or information the researcher uses a combination of Caesar Chiper and Hill Chiper which is modified into Morse code then the resulting CipherText results will be saved into a JPEG file using the LSB (Least Significant Bit) Steganography method. The process of storing messages or ciphertext into image files will make it difficult for irresponsible people or cryptoanalysts to solve messages sent in the form of images.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


Sign in / Sign up

Export Citation Format

Share Document