scholarly journals Analisa Frekuensi Hasil Enkripsi Pada Algoritma Kriptografi Blowfish Terhadap Keamanan Informasi

2018 ◽  
Vol 1 (1) ◽  
pp. 11-15
Author(s):  
Ferdy Riza ◽  
Nurmala Sridewi ◽  
Amir Mahmud Husein ◽  
Muhammad Khoiruddin Harahap

The ease of sending data with the development of internet technology technology is now a concern, especially the problem of data confidentiality, integrity and information security. Cryptography is one of the techniques used to maintain data confidentiality and information security, the application of cryptographic techniques for information security and data integrity is highly dependent on the formation of keys. In this study proposed a frequency analysis approach to measure the level of information security of blowfish encryption results to determine the distribution form of each character used in the text and find out the exact frequency of each character used in the test text data. The encryption algorithm and description of blowfish method against plaintext are proven to be accurate, but the longer the key character used will greatly affect the level of information security that came  from encryption process, this is based on the results of the frequency analysis conducted.

Author(s):  
Yogi Suryo Santoso

The process of exchanging digital messages is increasingly being used due to its easy and practical use. But the process of exchanging digital messages is vulnerable to being tapped by unauthorized people. Cryptography is the study of mathematical techniques related to aspects of information security, such as data confidentiality, data validity, data integrity, and data authentication. With cryptography, the process of exchanging messages between two people can be done securely. Thus, cryptographic techniques are used to overcome security issues when exchanging messages. The methods used in this study are hybrid hill cipher and RSA cryptography. In this study it was shown that hybrid hill cipher cryptography with a 3x3 matrix key and RSA with a 512 bit key can overcome security issues when exchanging data so that messages sent cannot be read by unauthorized people.


2019 ◽  
Vol 12 (2) ◽  
pp. 149-158
Author(s):  
Muhammad Fadlan ◽  
Sinawati Sinawati ◽  
Aida Indriani ◽  
Evi Dianti Bintari

The importance of maintaining data integrity and security is one of the challenges in the current digital era. One method that can be used to face this challenge is through cryptography. In cryptography there are several algorithms that can be used, one of which is the Caesar cipher algorithm. This algorithm has several disadvantages, including a limited number of characters of 26 characters. This can make the encryption results easily recognizable by other parties. This study aims to design a proposal for maintaining data security through cryptographic techniques, while addressing the problems inherent in the Caesar cipher algorithm. The combination of Caesar and Beaufort algorithm is done to overcome the existing problems. In addition, a character list of 94 characters was determined to be used in the process of encryption and decryption of text data. The result, through the integration of these two algorithms, the text cipher becomes more difficult to solve. There are two stages of the encryption process by using two different types of Keys for each stage in securing data


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Cigdem Bakir

Information security is defined as preventing actions such as unauthorized access and use, modification, and removal of information. It consists of certain basic elements of confidentiality, integrity, and accessibility. There are numerous studies in published literature which have been conducted to ensure information security. However, there is no previous study that covers these three basic elements together. In the present study, a model that includes these three key elements of information security together for big data was proposed and implemented. With this proposed “single-label model,” a more practical and flexible structure was established for all operations (read, write, update, and delete) performed on a database on real data. In previous studies conducted with a label model, separate labels were used for read-only or write-only operations, and there was no structure that could ensure both confidentiality and integrity at the same time. The present study, however, shows what type of authorization and access control could be established between which processes and which users by looking at a single label for all the operations performed on the data. Thus, in contrast to the previous studies seen in published literature, data confidentiality, data integrity, and data consistency were all guaranteed for all transactions. The results of the proposed single-label model were also shown comparatively by conducting an experimental study of its application. The results obtained are promising for further studies.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


2021 ◽  
pp. 1-13
Author(s):  
Fernando Rebollar ◽  
Rocío Aldeco-Perez ◽  
Marco A. Ramos

The general population increasingly uses digital services, meaning services which are delivered over the internet or an electronic network, and events such as pandemics have accelerated the need of using new digital services. Governments have also increased their number of digital services, however, these digital services still lack of sufficient information security, particularly integrity. Blockchain uses cryptographic techniques that allow decentralization and increase the integrity of the information it handles, but it still has disadvantages in terms of efficiency, making it incapable of implementing some digital services where a high rate of transactions are required. In order to increase its efficient, a multi-layer proposal based on blockchain is presented. It has four layers, where each layer specializes in a different type of information and uses properties of public blockchain and private blockchain. An statistical analysis is performed and the proposal is modeled showing that it maintains and even increases the integrity of the information while preserving the efficiency of transactions. Besides, the proposal can be flexible and adapt to different types of digital services. It also considers that voluntary nodes participate in the decentralization of information making it more secure, verifiable, transparent and reliable.


2011 ◽  
Vol 110 (1-2) ◽  
pp. 85-99 ◽  
Author(s):  
Petr Pišoft ◽  
Eva Holtanová ◽  
Peter Huszár ◽  
Jiří Mikšovský ◽  
Michal Žák

2014 ◽  
Vol 635-637 ◽  
pp. 1628-1631
Author(s):  
Li Juan Zhuang

In the context of the rapid development of Internet technology, information security is particularly important, especially at present there is growing incidence of attack targeting at the host and a variety of attacking means, which does a lot of harm. To do preventive work well is to figure out what risks threatening the host and formulate timely and effective measures to protect the host.The first computer in the world came out in 1946 in the USA. With the birth of this computer, the computer technology of humankind has made spectacular development for more than the last half century and penetrated into all aspects of our lives till today. Compared with traditional means of communication, the Internet has greatly facilitated our lives, which led to the growing dependence on the Internet as well. While technology is a double-edged sword, the Internet information security is also very acute problem, which greatly troubles people’s work and life. As the most fundamental part of a computer system, the host security problem draws people’s attention in particular.


Sign in / Sign up

Export Citation Format

Share Document