scholarly journals Data Security Using Multi-bit LSB and Modified Vernam Cipher

2019 ◽  
Vol 3 (2) ◽  
pp. 86-100 ◽  
Author(s):  
Goklas Tomu Simbolon ◽  
Opim Salim Sitompul ◽  
Erna Budhiarti Nababan

Data security is one of the most important aspects of today's information era. Some methods are used to secure important data from hackers. The LSB is a steganographic algorithm that is often used to store data in the last bit. In order to improve the security, we combine steganography with cryptography enables. In this research LSB is modified using the multi-bit LSB model. Modifications are made to the bits of each character, the rotation by a certain amount can randomize the plaintext content before cryptographic algorithm, Vernam is performed. The bit on LSB can be inserted data as much as 1, 2, 3 or 4 - bit information. The calculation results of MSE and PSNR values indicate that the use of 1-bit LSB is superior to that of 2-, 3-, or 4-bit LSB.

2021 ◽  
Vol 7 (2) ◽  
pp. 109-114
Author(s):  
Galih Agustian Perdana ◽  
Carudin ◽  
Rini Mayasari

Data is very important for humans, data is also needed to collect information. But given that cybercrime crime has occurred in the digital era today. Therefore, data security is very important to be considered. Inside the company has important data. One of the companies in Karawang, namely PT Adyawinsa Stamping Industries, has a data input application that is the company's asset data. Many data crime problems make database systems vulnerable to manipulation. Therefore, the implementation of data security for asset data is implemented using Playfair Cipher cryptography. The Playfair Cipher encrypts letter pairs (bigram or digraph) into letter pairs, not single letters as in other classic ciphers. The purpose of this study is an application that is able to encrypt data using the Playfair Cipher cryptographic algorithm and the application is also capable of performing decryption of data in a database that has been encrypted then entering data that has been encrypted into the database. The results of this study indicate that the system built has successfully performed encryption and decryption of asset data against user names and asset names using the Playfair Cipher cryptographic algorithm. There are differences in the results of the decryption tested in this study. However, the application can set the decryption results with the tools contained in the application.


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


2020 ◽  
Vol 4 (3) ◽  
pp. 1-10
Author(s):  
Naim BAFTIU

Cryptography is an old idea and science, but its approach exists and plays a large role in modernization today. Conventional cryptographic techniques form the basis of today's cryptographic algorithm. The different categories of algorithms have their respective features; internally, in performance and implementation. Cryptographic schemes and mechanisms have undergone continuous improvement. The application of cryptography has grown increasingly, ranging from limited use in state institutions to widespread use by private individuals and companies. The increased use of the Internet has significantly influenced the nature of applications and the way we communicate. Data security dictates the use of different cryptographic techniques. For this reason, we analyze in detail the various coding techniques by evaluating their performance and efficiency. Regarding the new paradigms in cryptography there are also new cryptographic schemes whose application requires detailed study and analysis. The classical cryptography algorithm is the oldest algorithm that was used long before the cryptographic system was discovered. Currently, the system has been widely applied to secure data, and using new methods in a way to improve existing methods. In this thesis the use of cryptographic methods using the C # programming language will be discussed.


2020 ◽  
Vol 8 (5) ◽  
pp. 1836-1839

The password system is the most conventional method among validation techniques on the internet and is operated more easily and effectively than other methods. However, it is a vulnerable method against attacks such as eavesdropping or replay attack. To prevail over this problem, OTP (One Time Password) technique is used. The most popular OTP is HOTP algorithm, which is based on one-way hash function SHA-1. The recent researches show the weakness of the hash function. So, in this paper we created a module which uses another cryptographic algorithm. Cryptography in the current world serves an important role in data security. Cryptography means writing of secret codes (cipher text) which is in an unintelligible form and cannot be read unless we have a perfect key to decode it. The proposed method is AES algorithm (128 bit) followed by Middle Square method to generate an OTP. As OTP is a 4-6 bit number we will decrease the AES output to a 4-6 bit through Middle Square method and this OTP can be used as a security tool in many cases like online transaction purposes.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Data security is a way to ensure that stored data is safe from corruption and that access to it is accordingly controlled. Data security helps to ensure privacy. It also helps protect personal data from theft. Data theft is one that often occurs on global computer networks. It includes criminal acts in the internet world. Chronology of theft is that an intruder enters a system and retrieves essential information without the owner's knowledge. Intruders use data that has been taken for various crimes. Various ways that intruders take to retrieve the data. This action is proven by the amount of internet traffic that is looking for a gap to infiltrate a system. Cryptography is needed to protect essential data. One of the classic algorithms used is Gronsfeld Cipher. This algorithm works by exchanging characters in messages using substitution tables. The key used is a number that determines the shift of plaintext and key. The resulting ciphertext is the result of plaintext substitution with the key table. This algorithm is constructive for users to secure their essential information when it will be sent through a global network.


Compiler ◽  
2014 ◽  
Vol 3 (1) ◽  
Author(s):  
Cakra Aminuddin Hamka ◽  
Haruno Sajati ◽  
Yuliani Indrianingsih

Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.


2018 ◽  
Vol 1 (2) ◽  
pp. 20-28
Author(s):  
Aditya Kurniawan ◽  
Ratna Mayasari ◽  
Muhammad Ary Murti

Data security is one of many problems that we face in IoT implementation. One of the problems with data security is we cannot assure that the data we received in the server-side is truly our data that we send from client-side or sensor-side. With that problems, comes some solutions like encryption and decryption method or some basic authentication planted on the server-side. In this research, we propose some encryption and decryption method that can be easily implemented on both server and sensor-side and then we analyze the complexity of its algorithm. This research aims to create some authentication process for the data that server-side receive from the sensor-side by creating encrypted ID consisting of 6 digits of alphanumeric and useful for identification process in system, so the server can recognize the data and validate it.


2013 ◽  
Vol 679 ◽  
pp. 143-146
Author(s):  
Zhang Hui ◽  
Li Qiang An ◽  
Peng Yue

Database system is information aggregation. So the security of database is very important. This paper describes the research process of tracking SQL server database data tampered. Now we can monitor the important data in daily work. And providing a guarantee for the safety, accuracy of database.


2017 ◽  
Vol 26 (09) ◽  
pp. 1750141 ◽  
Author(s):  
Soufiane Oukili ◽  
Seddik Bri

Cryptography has an important role in data security against known attacks and decreases or limits the risks of hacking information, especially with rapid growth in communication techniques. In the recent years, we have noticed an increasing requirement to implement cryptographic algorithms in fast rising high-speed network applications. In this paper, we present high throughput efficient hardware implementations of Advanced Encryption Standard (AES) cryptographic algorithm. We have adopted pipeline technique in order to increase the speed and the maximum operating frequency. Therefore, registers are inserted in optimal placements. Furthermore, we have proposed 5-stage pipeline S-box design using combinational logic to reach further speed. In addition, efficient key expansion architecture suitable for our proposed design is also presented. In order to secure the hardware implementation against side-channel attacks, masked S-box is introduced. The implementations had been successfully done by virtex-6 (xc6vlx240t) Field-Programmable Gate Array (FPGA) device using Xilinx ISE 14.7. Our proposed unmasked and masked architectures are very fast, they achieve a throughput of 93.73 Gbps and 58.57 Gbps, respectively. The obtained results are competitive in comparison with the implementations reported in the literature.


Sign in / Sign up

Export Citation Format

Share Document