ADOPSI PEMBANGKIT KUNCI EXTENDED VIGENERE MENGGUNAKAN FUNGSI RANDOM DAN BLUM BLUM SHUB
DOI:
https://doi.org/10.36595/jire.v5i2.706Keywords:
vigenere, kunci, pemilihan kunci, entropiAbstract
Keberadaan teknologi basis data memberikan banyak keuntungan dalam melakukan pertukaran, pengiriman dan penyimpanan informasi. Meskipun demikian, data yang disimpan secara awan ditempat pihak ketiga secara polos akan dengan mudah untuk diretas dan dibaca oleh pihak yang tidak berwenang. Dengan menggunakan teknik kriptografi akan membantu merahasikan data tersebut sehingga akan menjadi lebih aman. Namun banyak algoritma yang telah diretas, sehingga perlu adanya modifikasi dan pengembangan yang dilakukan pada sebuah algoritma kriptografi. Salah satu algoritma klasik yang masih dikembangkan sampai saat ini ialah vigenere. Dengan melakukan pemilihan kunci yang tepat, maka informasi yang diamakan oleh vigenere akan mejadi lebih kuat. Eksperimen ini bertujuan untuk memperkuat vigenere dengan mengadopsi proses pemilihan kunci yang berlapis. Selain menggunaka fungsi random juga ditambahkan penggunaan blum blum shub. Sebagai metrik performasi digunakan entropi. Hasil yang diperoleh ialah peningkatan capaian ketahanan informas hingga lebih dari 80% dengan nilai entropi yang lebih baik dari sebelumnya
References
M. S. Abbas, S. S. Mahdi, and S. A. Hussien, “Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography,” in 2020 International Conference on Computer Science and Software Engineering (CSASE), Apr. 2020, pp. 123–127. doi: 10.1109/CSASE48920.2020.9142072.
E. Ardhianto, H. Murti, E. Supriyanto, and E. Lestariningsih, “Modifikasi Model Enkripsi Encryption With Covertext and Reordering menggunakan Fungsi Random dan Tabel Permutasi,” Jurnal Informatika Upgris, vol. 8, no. 1, Jul. 2022, doi: 10.26877/jiu.v8i1.9758.
E. Ardhianto, “Improvement of Steganography Technique: A Survey,” in 1st International Multidisciplinary Conference on Education, Technology, and Engineering (IMCETE 2019), 2020, pp. 289–292. [Online]. Available: www.scimagojr.com.
A. AminSoofi, M. Irfan Khan, and F.-A. Fazal-e-Amin, “A Review on Data Security in Cloud Computing,” Int J Comput Appl, vol. 94, no. 5, pp. 12–20, May 2014, doi: 10.5120/16338-5625.
B. B. Ahamed and M. Krishnamoorthy, “SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm,” Journal of the Operations Research Society of China, 2020, doi: 10.1007/s40305-020-00320-x.
A. Permana, T. Tulus, and Z. Situmorang, “Combination of One Time Pad Cryptography Algorithm with Generate Random Keys and Vigenere Cipher with EM2B KEY,” Jan. 2020. doi: 10.4108/eai.3-8-2019.2290723.
E. Ardhianto, W. Budiharto, Y. Heryadi, and L. A. Wulandhari, “A Comparative Experiment of Document Security Level on Parallel Encryption With Digit Arithmetic of Covertext and Parallel Encryption using Covertext,” in 2021 IEEE 19th Student Conference on Research and Development (SCOReD), Nov. 2021, pp. 163–167. doi: 10.1109/SCOReD53546.2021.9652746.
E. Ardhianto, W. T. Handoko, H. Murti, and R. S. A. Redjeki, “Encryption with Covertext and Reordering using Permutated Table and Random Function,” in 2021 2nd International Conference on Innovative and Creative Information Technology (ICITech), Sep. 2021, pp. 90–93. doi: 10.1109/ICITech50181.2021.9590171.
R. Shukla, H. O. Prakash, R. P. Bhushan, S. Venkataraman, and G. Varadan, “Sampurna Suraksha: Unconditionally Secure and Authenticated One Time Pad Cryptosystem,” in 2013 International Conference on Machine Intelligence and Research Advancement, Dec. 2013, pp. 174–178. doi: 10.1109/ICMIRA.2013.40.
F. Al-Haidari, A. Gutub, K. Al-Kahsah, and J. Hamodi, “Improving security and capacity for Arabic text steganography using Kashida extensions,” in 2009 IEEE/ACS International Conference on Computer Systems and Applications, 2009, pp. 396–399. doi: 10.1109/AICCSA.2009.5069355.
Y. Wu and X. Dai, “Encryption of accounting data using DES algorithm in computing environment,” Journal of Intelligent and Fuzzy Systems, vol. 39, no. 4, pp. 5085–5095, 2020, doi: 10.3233/JIFS-179994.
E. Ardhianto, W. T. Handoko, E. Supriyanto, and H. Murti, “Evolusi Cipher Vigenere dalam Peningkatan Pengamanan Informasi,” JURNAL INFORMATIKA UPGRIS, vol. 7, no. 2, pp. 23–27, 2021.
E. Supriyanto, W. T. Handoko, S. A. Wibowo*, and E. Ardhianto, “Peningkatan Ketahanan Algoritma Vigenere menggunakan Generator kunci Tiga Lapis,” JURNAL MAHAJANA INFORMASI, vol. 7, no. 1, pp. 24–33, Jun. 2022, doi: 10.51544/jurnalmi.v7i1.2894.
S. Park, J. Kim, K. Cho, and D. H. Yum, “Finding the key length of a Vigenère cipher: How to improve the twist algorithm,” Cryptologia, vol. 44, no. 3, pp. 197–204, May 2020, doi: 10.1080/01611194.2019.1657202.
K. Nahar and P. Chakraborty, “A Modified Version of Vigenere Cipher using 95×95 Table,” International Journal of Engineering & Advanced Technology (IJEAT), vol. 9, no. 5, pp. 1144–1148, 2020, doi: 10.35940/ijeat.E9941.069520.
N. Uniyal, G. Dobhal, A. Rawat, and A. Sikander, “A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication,” Wirel Pers Commun, vol. 119, no. 2, pp. 1577–1587, Jul. 2021, doi: 10.1007/s11277-021-08295-5.
F. Telaumbanua and T. Zebua, “Modifikasi Vigenere Cipher Dengan Pembangkit Kunci Blum Blum Shub,” KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), vol. 4, no. 1, 2020, doi: 10.30865/komik.v4i1.2646.
Z. Qowi and N. Hudallah, “Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm,” in Journal of Physics: Conference Series, Jun. 2021, vol. 1918, no. 4, pp. 1–6. doi: 10.1088/1742-6596/1918/4/042009.
A. P. Sidik, “Improve The Security of The Vigenère Cypher Algorithm by Modifying the Encoding Table and Key,” International Journal of Basic and Applied Science, vol. 10, no. 2, pp. 42–50, 2021, [Online]. Available: www.ijobas.pelnus.ac.id
S. Rubinstein-Salzedo, “The Vigenère Cipher,” in Cryptography, Springer, Cham, 2018, pp. 41–54. doi: 10.1007/978-3-319-94818-8_5.
I. Mu’alimin Arrijal, R. Efendi, and B. Susilo, “PENERAPAN ALGORITMA KRIPTOGRAFI KUNCI SIMETRIS DENGAN MODIFIKASI VIGENERE CIPHER DALAM APLIKASI KRIPTOGRAFI TEKS,” Jurnal Pseudocode, vol. 1, 2016, [Online]. Available: www.ejournal.unib.ac.id
A. Vassilev and R. Staples, “Entropy as a Service: Unlocking Cryptography’s Full Potential,” Computer (Long Beach Calif), vol. 49, no. 9, pp. 98–102, Sep. 2016, doi: 10.1109/MC.2016.275.
K. Chanda, “Password Security: An Analysis of Password Strengths and Vulnerabilities,” International Journal of Computer Network and Information Security, vol. 8, no. 7, pp. 23–30, Jul. 2016, doi: 10.5815/ijcnis.2016.07.04.
P. Patil, P. Narayankar, Narayan D.G., and Meena S.M., “A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish,” Procedia Comput Sci, vol. 78, pp. 617–624, 2016, doi: 10.1016/j.procs.2016.02.108.
Additional Files
Published
How to Cite
Issue
Section
License
Semua tulisan pada jurnal ini menjadi tanggungjawab penuh penulis.