scholarly journals Implementasi Algoritma Goverment Standard (GOST) dalam Pengamanan File Dokumen

2020 ◽  
Vol 1 (2) ◽  
pp. 52-56
Author(s):  
Sugiarti Sugiarti ◽  
Mirnawati
Keyword(s):  

Dokumentasi dalam teknologi saat ini adalah hal yang tak dapat terlepas dari kebutuhan suatu lembaga atau instansi dimana dokumen adalah hal yang paling sering digunakan baik dalam bentuk dokumen manual maupun dalam bentuk file teks dalam komputer. Oleh karena itu,.keamanan data atau dokumen rahasia sangat dibutuhkan dalam bisnis maupun pribadi. Tetapi dalam pengiriman atau pengamanan file data yang bersifat rahasia masih kurang dalam sistem keamanan data. Maka dari itu perlu keamanan tambahan untuk proses penyimpanan file baik itu file yang di rasa pribadi maupun data dalam keorganisasian dengan menggunakan proses enkripsi dan deskripsi menggunakan metode Government Standard (GOST). Maka data penting dapat lebih terjaga dan dengan adanya aplikasi ini kita dapat mengenkripsi data untuk menjaga kerahasiaan file yang kita simpan. Aplikasi ini dibangun dengan menggunakan Visual Studio 2010.

2012 ◽  
Vol 253-255 ◽  
pp. 1803-1807
Author(s):  
Ka Ding Liu ◽  
Jing Cao ◽  
Jiang Hu

In recent years, urban rail transit construction asks for the safety of project with strict requests, because of its difficulty, high risk and complexity characteristics. Henggang metro depot possess double using garage , DC1500 contact rail system, and cover property on the top of the garage, thus it will face greater challenge in safety management. According to above characteristics, this research puts forward the system security goals, principles, and establishes a set of safeguard system, which includes three aspects: the legal laws and regulations, the organization construction, and the technical method. The safeguard system will play an important and guiding role in government standard formation and metro-property development mode promotion in other cities.


2018 ◽  
Vol 10 (2) ◽  
pp. 49
Author(s):  
Abduh Riski ◽  
Heri Purwantoro ◽  
Ahmad Kamsyakawuni

Government Standard (GOST) is a 64-bit block cipher algorithm with 32 round, use a 256-bit key. The weakness of this algorithm is the keys so simple, than make cryptanalyst easy to break this algorithm. Least Significant Bit (LSB)  use to insert message into another form without changing the form of the cover after insertion. This research does by hiding encrypted ciphertext to image and hiding image into audio. This research use grayscale and RBG image with BMP and PNG format. Audio using music with wav format. Security analysis using differential analysis NPCR and UACI. Security analysis aims to calculate percentage from cover after hiding the message. The smaller the NPCR and UACI values, the higher the level of security the message is hidden. The results of the analysis of concealment in the image obtained by the average values of NPCR and UACI were 99.98% and 3.46% respectively. While the results of the analysis of hiding in audio obtained the average value of NPCR and UACI were 83.78% and 12.66% respectively.


2021 ◽  
Author(s):  
Jan Teorell ◽  
Aksel Sundström ◽  
Sören Holmberg ◽  
Bo Rothstein ◽  
Natalia Alvarado Pachon ◽  
...  
Keyword(s):  

1976 ◽  
Vol 19 (3) ◽  
pp. 384-386
Author(s):  
O. P. Galakhova ◽  
E. K. Dranishnikova ◽  
M. S. Belyaeva

2012 ◽  
Vol 53 (1) ◽  
pp. 65-79 ◽  
Author(s):  
Nicolas T. Courtois ◽  
Jerzy A. Gawinecki ◽  
Guangyan Song

ABSTRACT GOST is a well-known government standard cipher. Since 2011 several academic attacks on GOST have been found. Most of these attacks start by a so called “Complexity Reduction” step [Courtois Cryptologia 2012] the purpose of which is to reduce the problem of breaking the full 32-round GOST to a low-data complexity attack on a reduced-round GOST. These reductions can be viewed as optimisation problems which seek to maximize the number of values inside the cipher determined at given “cost” in terms of guessing other values. In this paper we look at similar combinatorial optimisation questions BUT at the lower level, inside reduced round versions of GOST. We introduce a key fundamental notion of Contradiction Immunity of a block cipher. A low value translates to working software attacks on GOST with a SAT solver. A high value will be mandatory for any block cipher to be secure. We provide some upper bounds for the Contradiction Immunity of GOST.


Sign in / Sign up

Export Citation Format

Share Document