scholarly journals Perancangan Aplikasi Penyandian Pesan Teks dengan Menggunakan Algoritma Digraph Cipher

2020 ◽  
Vol 2 (1) ◽  
pp. 25-34
Author(s):  
Yhopi Suhelna

Humans interact with fellow humans using communication. Not everything that is communicated contains a message so that it can be known by many people, sometimes the communication is confidential so that only certain people can know it. The occurrence of data tapping submitted is certainly a problem if the data is confidential, therefore a data security system is needed so that the data cannot be stolen or changed by tappers or crackers. One solution to secure data is to use cryptography. Cryptography is the science and art of maintaining message security when messages are sent from one media to another without experiencing interference from third parties. Through cryptographic techniques, data can be changed into passwords that are not understood and return them back to the original, this process is called data encryption and decryption. This data security process uses the Digraph Cipher method. Some facilities in the Digraph Cipher method are the keys used in the encryption and decryption process are the same (symmetrical) and the decryption process is the opposite of the encryption process.

JURTEKSI ◽  
2019 ◽  
Vol 6 (1) ◽  
pp. 1-10
Author(s):  
Sebastian Suhandinata ◽  
Reyhan Achmad Rizal ◽  
Dedy Ongky Wijaya ◽  
Prabhu Warren ◽  
Srinjiwi Srinjiwi

Abstract:Computer data security relies on preventing data theft from irresponsible parties by using cryptography method. Some cryptography algorithms have good and poor performance in encrypting and decrypting data depending on the key types. Therefore the purpose of this research is to measure the performance of the hybrid algorithm, consisting a symmetric keyBlowfish algorithm and an asymmetric key RSA algorithm, in encrypting and decrypting multiple types of data such as documents, photos, audios, and videos. The result is the performance of the hybrid algorithm is almost on par with Blowfish and provides a more secure data encryption and decryption by taking advantage of RSA algorithm. The average encryption performance of hybrid algorithm is 0.85s on document, 1.06s on photo, 3.38s on audio, and 15.56s on video. While the average decryption performance of hybrid algorithm is 1.01s on document, 1.38s on photo, 4.3s on audio, and 27.56s on video.            Keywords:Hybrid cryptography, Data security, Performance, Blowfish, RSA  Abstrak:Keamanan data komputer berhubungan dengan pencegahan dari pencurian data oleh pihak yang tidak bertanggung jawab, salah satu cara pengamanan data komputer yaitu dengan teknik kriptografi. Beberapa metode kriptografi memiliki performa yang baik dan buruk tergantung dengan tipe kuncinya. Maka dari itu, tujuan dari penelitian ini adalah mengukur tingkat kecepatan kriptografi hybrid, terdiri dari algoritma simetris Blowfish dan algoritma asimetris RSA, dengan beberapa tipe data seperti dokumen, foto, audio dan video. Hasil dari penelitian ini adalah algoritma hybrid memiliki performa yang tidak jauh berbeda dari algoritma Blowfish dan membuat proses enkripsi dan dekripsi data lebih aman dengan keunggulan dari algoritma RSA. Rata-rata kecepatan enkripsi algoritma hybrid untuk dokumen 0,85 detik, gambar 1,06 detik, audio 3,38 detik, dan video 15,56 detik. Sedangkan rata-rata kecepatan dekripsi algoritma hybrid untuk dokumen 1,01 detik, gambar 1,38 detik, audio 4,3 detik, dan video 27,56 detik. Kata kunci:Kriptografihybrid, Keamanan data, Performa, Blowfish, RSA 


2019 ◽  
Vol 6 (6) ◽  
pp. 697
Author(s):  
Nuniek Fahriani ◽  
Harunur Rosyid

<p><strong><span style="font-family: Times New Roman; font-size: small;">Abstrak</span></strong></p><p>Kriptografi (<em>cryptography</em>) merupakan proses keamanan data untuk menjaga pesan (file) agar tidak “diganggu” oleh pihak ketiga. kriptografi memiliki unsur proses, yaitu : enkripsi, dekripsi, dan kunci. Menjadi kebutuhan <em>user</em> untuk menghindari ‘pihak ketiga’ yang bisa merubah, mengambil ataupun menghilangkan data secara fisik atau menjalankan fungsi program yang mengganggu sistem. Tingkat keaslian data menjadi bagian penting didalam sistem keamanan data. Jenis data berupa file yang berpotensi “dirusak” secara illegal tidak hanya berextention .doc bisa saja jenis file yang berextention file video. Untuk menjalankan fungsi dari sistem keamanan data file video, legalitas akses akan data sangat penting untuk<em> secure</em> sehingga tidak berakibat kepada penyalahgunaan hak akses data. Teknik yang digunakan untuk menunjang enkrip dan dekrip file video adalah menerapkan algoritma blowfish didalam implementasinya. Algoritma ini memiliki sistem keamanan yang variabel. Hasil ujicoba menggunakan 6 contoh file extention yang melalui teknik enkrip dan dekrip adalah : file extention .asf, .wmv, .avi, .3pp, .flv, .vob. Dibangun berbasis desktop.</p><p> </p><p><strong><em><span style="font-family: Times New Roman; font-size: small;">Abstract</span></em></strong></p><p><em><span style="font-family: Times New Roman; font-size: small;">Cryptography (cryptography) is a data security process to keep messages (files) from being "disturbed" by third parties. Cryptography has three basic functions, namely: encryption, decryption, and key. Being a user need to avoid 'third parties' who can change, retrieve or delete data physically or run program functions that interfere with the system. The level of authenticity of the data becomes an important part in the data security system. This type of data in the form of files that have the potential to be "tampered" illegally not only with the .doc extension can be the file type with the video file extension. To perform the function of the video file data security system, the legality of access to data is very important to secure so that it does not result in misuse of data access rights. The technique used to support encryption and decryption of video files is to apply the blowfish algorithm in its implementation. This algorithm has a variable security system. The test results using 6 sample file extensions that go through the encryption and decryption process are: file extension .asf, .wmv, .avi, .3pp, .flv, .vob. Desktop based.</span></em></p><p> </p>


Author(s):  
Reni Rahmadani ◽  
Harvei Desmon Hutahaean ◽  
Ressy Dwitias Sari

A lot of data is misused without the data owner being aware of it. Software developers must ensure the security user data on their system. Due to the size of the market that houses data, the security of record databases must be of great concern. Cryptographic systems or data encryption can be used for data security. The Merkle-Hellman Knapsack algorithm is included in public-key cryptography because it uses different keys for the encryption and decryption processes. This algorithm belongs to the NP-complete algorithm which cannot be solved in polynomial order time. This algorithm has stages of key generation, encryption, and decryption. The results of this study secure database records from theft by storing records in the form of ciphertext/password. Ciphertext generated by algorithmic encryption has a larger size than plaintext.


2020 ◽  
Vol 8 (4) ◽  
pp. 475
Author(s):  
Maria Okta Safira ◽  
I Komang Ari Mogi

In this paper two methods are used, namely the vigenere cipher method and the RSA method. The vigenere cipher method is an example of a symmetric algorithm, while RSA is an example of an asymmetric algorithm. The combination of these two methods is called hybrid cryptography which has the advantage in terms of speed during the encryption process. Each process, which is encryption and decryption, is carried out twice, so that security can be ensured. In the process of forming the key used the RSA method. In the encryption process using public keys that have been generated before when the key is formed. This public key is used in sending data to the recipient of a secret message where this key is used for the data encryption process. The Secret key is kept and will be used during the decryption process. There is a system architecture that describes how clients and servers communicate with each other over the internet using the TCP protocol where the client here is an IoT device and the server is a server. 


2021 ◽  
Vol 15 (2) ◽  
pp. 65-75
Author(s):  
Maulyanda Az ◽  
Syafrial Fachri Pane ◽  
Rolly Maulana Awangga

Abstrak Penelitian ini membantu dalam melalukan proses Keamanan data atau informasi untuk menjamin kerahasiaan dan keaslian data atau informasi. Dalam perancangan ini menggunakan Kriptografi sebagai salah satu solusi dalam mengamankan data atau informasi. Metode kriptografi digunakan untuk mempersatukan algoritma Md5, Base64 serta AES (Advanced Encryption Standard). Kombinasi dari tiga algoritma menghasilkan ciphertext, yang dapat mengamankan data dari proses tag NFC. Penelitian ini menggunakan metodologi penelitian yang dapat menyatakan bahwa sistem yang dibangun dapat berfungsi dengan baik dan untuk keamanan nya aman digunakan, dari hasil penerapannya didapatkan hasil persentase keberhasilan 100%. Jadi, penelitian ini mampu menjawab permasalahan yang terjadi pada sistem keamanan data. Abstract This research helps in carrying out data or information security to ensure the confidentiality and authenticity of data or information. This design uses Cryptography as a solution in securing data or information. Cryptographic methods to unify the Md5, Base64, and AES (Advanced Encryption Standard) algorithms. The combination of the three algorithms produces ciphertext, which can secure data from the NFC tag process. This study uses a research methodology that can state that the system built can function correctly, and for security, it is safe to use because it has a 100% success percentage. So, this researchable to answer the problems that occur in the data security system.


Compiler ◽  
2014 ◽  
Vol 3 (1) ◽  
Author(s):  
Muttaqin Muttaqin ◽  
Haruno Sajati ◽  
Nurcahyani Dewi Retnowati

Chatting application is an application which used for communication through local network or internet. It can use to make communication to be effective and easy to use but there are several shortage in delivery information process is data security when communication is going on. Using chrypthography with modification Rivest Shamir adleman (RSA) algorithm in encryption process and decryption on packet data which transmited is one of security system which can used in this application then the security of data packet secured. Result from implementation of chatting application which apply chrypthography with modification Rivest Shamir adleman (RSA) algorithm have done in local network and internet able to run smoothly and have done by several testing cases based on certain scenario.  Whereas process testing encryption  and decryption using tools wireshark.


Author(s):  
Pratiksha Satapure

Abstract: Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vital information in a secret way. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, nonrepudiation. The security of communication is a crucial issue on World Wide Web. It is about confidentiality, integrity, authentication during access or editing of confidential internal documents. Keywords: Cryptography, Hill Cipher, Homophonic Substitution Cipher, Monoalphabetic Cipher, Ceaser Cipher.


Nowadays, data keeps increasing; this in turn makes big data one of the hot topics in the modern era of technology. The biggest challenge, however, is big data security and cryptography is one of the most secure techniques. In this proposed model, we use this technique to secure data via a proposed new stream cipher technique to process more than one block by dividing the total size of the block into two parts, and swapping them then, combine and apply XOR operation with key and make some of mathematical operation. This operation is of fifteen rounds which make it very difficult for attacks to guess the plaintext.


Sign in / Sign up

Export Citation Format

Share Document