block chaining
Recently Published Documents


TOTAL DOCUMENTS

74
(FIVE YEARS 30)

H-INDEX

4
(FIVE YEARS 2)

2021 ◽  
Vol 6 (2) ◽  
pp. 54-61
Author(s):  
Lekso Budi Handoko ◽  
Andi Danang Krismawan

The increase in significant advances in information technology greatly provides comfort and convenience in managing data. This convenience is what makes people who are not responsible for using it as a crime such as hacking, cracking, phishing, and so on. In Telkom Region 4 Semarang, there is a container where there are important company data such as customer data. Customer data is very important and the contents of the data must be kept confidential. The company has experienced significant losses due to information leakage due to negligence in the last 5 years. For this reason, data security is necessary so that data is safe and is not misused. This study applies the Advance Encryption Standard algorithm - Cipher Block Chaining (AES-CBC) and Stream cipher in order to secure data so as to reduce the risk of data theft by telecom subscribers. Based on the average avalanche effect value of AES-CBC and a stream cipher of 49.34%, this shows that the AES-CBC and Stream Cipher encrypted files are difficult to crack so that data confidentiality is well maintained.


2021 ◽  
Vol 21 (2) ◽  
pp. 101
Author(s):  
Maulidyah Lailatun Najah ◽  
Kiswara Agung Santoso

Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by irresponsible people. Cryptography is the science or art for security message. In cryptography there are two important processes, namely encryption and decryption. The sender's job is to encrypt the message and the receiver's job is to decrypt the message. The key used for this cryptographic process is the Cipher Block Chaining (CBC) operation mode. CBC mode is a very simple operation mode, so additional techniques are needed to make it more secure. The plaintext will be replaced with new plaintext resulting from a combination of Caesar Cipher and Reverse Cipher techniques. The results obtained indicate that the application of plaintext modifications to CBC can improve message security because the keys used are increasingly complex.


Author(s):  
Jessy Ayala

The focus of this research is to analyze the results of encrypting audio using various authenticated encryption algorithms implemented in the Python cryptography library for ensuring authenticity and confidentiality of the original contents. The Advanced Encryption Standard (AES) is used as the underlying cryptographic primitive in conjunction with various modes including Galois Counter Mode (GCM), Counter with Cipher Block Chaining Message Authentication Code (CCM), and Cipher Block Chaining (CBC) with Keyed-Hashing for encrypting a relatively small audio file. The resulting encrypted audio shows similarity in the variance when encrypting using AES-GCM and AES-CCM. There is a noticeable reduction in variance of the performed encodings and an increase in the amount of time it takes to encrypt and decrypt the same audio file using AES-CBC with Keyed-Hashing. In addition, the corresponding encrypted using this mode audio spans a longer duration. As a result, AES should either have GCM or CCM for an efficient and reliable authenticated encryption integration within a workflow.


2021 ◽  
Vol 1964 (4) ◽  
pp. 042054
Author(s):  
V Prasanna Srinivasan ◽  
C Viswanathan ◽  
P Sailaja ◽  
G Manimala

2021 ◽  
Vol 12 (11) ◽  
pp. 1861-1872
Author(s):  
Damanpreet Kaur, Et. al.

Security in financial transactions is a necessity. This security is provided using various encryption mechanisms such as RSA, DES, AES, and hybrid encryption mechanisms. The problem, however, arises when financial transactions take place in the banking sector. This paper proposes a unique DNA-based block chaining to avoid any collision and to provide a high-end security during financial transactions. The block chaining mechanism provides a two-way security during financial transactions along with avoading data theft, as well as data loss, is avoided. The implementation results of the proposed system are presented in terms of throughput, encryption time, and decryption time. The results obtained for the encryption and throughput, are optimized using this approach, however, encryption time still requires certain modifications. The overall results are better than Changsong et al., 2020.


2021 ◽  
Vol 11 (1) ◽  
pp. 6-11
Author(s):  
Achmad Sudrajat ◽  
Yoyok Heru Prasetyo ◽  
Mila Kusumawardani

Robot humanoid adalah robot yang memiliki bentuk seperti manusia yaitu memiliki tubuh dan kepala, dua tangan dan dua kaki yang memungkinkan dapat bergerak dan berinteraksi dengan lingkungan yang dibuat oleh manusia [1]. Pada sistem robot sepak bola humanoid yang digunakan saat ini masih menggunakan sistem Robot Operating System (ROS) saja, yang pada dasarnya di dalam sistem tersebut tanpa ada enkripsi atau pengaman data setiap kali komunikasi dilakukan dengan pengiriman dan permintaan atau yang biasa disebut Publish dan Subscribe. Dalam rangka pengembangan robot sepak bola humanoid, penelitian ini dirancang untuk “Implementasi Enkripsi Advanced Encryption Standard (AES-128) Mode Cipher Block Chaining (CBC) Sebagai Keamanan Komunikasi Pergerakan Robot Humanoid KRSBI”. Yang didesain untuk beroperasi pada konektivitas dengan kualitas yang rendah, dengan network bandwidth yang mengamankan setiap node yang berjalan di dalam ROS yang didalamnya terdapat fitur untuk subscribe topik dan juga publish topik. Kemudian dengan tambahan kriptografi dapat menjaga agar data atau pesan tetap aman saat dikirimkan, dari pengirim ke penerima tanpa mengalami gangguan dari pihak ketiga. Menurut Bruce Scheiner dalam bukunya "Applied Cryptography", kriptografi adalah ilmu pengetahuan dan seni menjaga message- message agar tetap aman (secure). [2] Maka semua komunikasi dienkripsi dengan menggunakan Secure Sockets Layer (SSL), atau lebih spesifiknya Transport Layer Security (TLS).


Sign in / Sign up

Export Citation Format

Share Document