Pembangkitan Kunci Beaufort Cipher Dengan Teknik Blum-blum Shub pada Pengamanan Citra Digital

  • Eferoni Ndruru Universitas Budidarma Medan, Indonesia
  • Taronisokhi Zebua * Mail Universitas Budidarma Medan, Indonesia
Keywords: Beaufort Cipher; Keamanan Data; Blum-Blum Shub; Pengmbangkit Kunci; Citra Digital

Abstract

Data security is not only due to the complexity of the algorithms used, but one of the most important factors is the security of the keys used. One of the most popular data that needs to be backed up today is digital images. However, these days, the algorithms used to back up data are often attacked. This is because the structure of the key formations used is still weak. One of the data security algorithms that form a simple key is the Beaufort cipher. It relies on the duplication of key characters to form the key for each protected element. Key generators based on blum-blum shub technology can generate very random and difficult-to-guess keys, so the strength of the keys you use can enhance the resilience of protected data. Keys generated based on blum-blum shub technology will later be used in the process of encrypting and decrypting pixel values in digital images.

References

E. N. T. Guruh M Arindra Pratama, “No Title,” Metod. Catalan Number dan Double Columnar, vol. 4, no. 5, pp. 31–40, 2015.

T. Zebua, “Encoding the Record Database of Computer Based Test Exam Based on Spritz Algorithm,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 9, no. 1, p. 52, 2018, doi: doi: 10.24843/lkjiti.2018.v09.i01.p06.

B. S. I. M. Arrijal and R. Efendi, “Penerapan Algoritma Kriptografi Kunci Simetris dengan Modifikasi Vigenere Cipher dalam Aplikasi Kriptografi Teks,” J. Pseudocode, vol. 3, no. 1, pp. 69–82, 2016, doi: 10.33369/pseudocode.3.1.69-82.

M. Diana and T. Zebua, “Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS,” J. Sains Komput. Inform., vol. 2, no. 1, pp. 12–22, 2018.

M. B. Sanjaya and P. A. Telnoni, “Implementasi Random Number Blum-Blum-Shub dan Chaotic Function untuk Modifikasi Key Generating pada Kriptografi AES,” J. Elektro Telekomun. Ter. Desember, vol. 1, no. 3, pp. 154–165, 2015.

B. Aïssa, “Implementation of Blum Blum Shub Generator for Message Encryption,” Int. Conf. Control. Enginering Inf. Tecknology (CEIT’ 14), vol. 1, no. 4, p. 2014.

E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab. Yogyakarta: Andi, 2015.

R. A. R. U. Marsal and F. Arnia, “Enkripsi dan Dekripsi Citra Menggunakan Modifikasi Algoritma Vigenere Cipher,” KITEKTRO J. Online Tek. Elektro, vol. 3, no. 3, pp. 6–10, 2018.

H. Mukhtar, Kriptografi untuk Keamanan Data, 1st ed. Yogyakarta: CV. Budi Utama, 2018.

Wikipedia, “Beaufort Cipher,” https://en.wikipedia.org/wiki/ Beaufort_cipher, 2020. [Accessed 17 February 2021].

E. Apriliana, “Kombinasi Algoritma One Time Pad dengan Pembangkit Kunci Blum Blum Shub,” J. Inform. Bandung, vol. 1, no. 70, pp. 11–20, 2016.

A. Hoerudin, “Game Puzzle Makanan Tradisional Dengan Menggunakan Algoritma Blum Blum Shub sebagai Pengacakan Gambar,” J. Fak. Ilmu Komput. Jakarta, vol. 1, no. 6, pp. 1–8, 2010.

T. S. Waruwu and K. Telaumbanua, “Kombinasi Algoritma OTP Cipher dan Algoritma BBS dalam Pengamanan File,” JSM STIMIK Mikroskil, vol. 17, no. 1, pp. 119–126, 2016.

H. Y. A. Sinaga and L. Sitorus, “Pengamanan File Citra Digital Dengan Menggunakan Metode Least Significant Bit Dan End Of File,” J. Tek. Inform. Unika St. Thomas, vol. 2, no. 2, pp. 33–41, 2017.

Aldo and L. Hakim, “Implementasi Steganografi Pada Citra Digital dan Kriptografi Algoritma Hill Cipher Untuk Pengamanan Informasi Berupa Text,” J. Ilm. Teknol. Inf. Terap., vol. V, no. 1, pp. 6–17, 2018.

Dimensions Badge
Published
2022-06-30
How to Cite
Ndruru, E., & Zebua, T. (2022). Pembangkitan Kunci Beaufort Cipher Dengan Teknik Blum-blum Shub pada Pengamanan Citra Digital. Bulletin of Information Technology (BIT), 3(2), 149 - 154. https://doi.org/10.47065/bit.v3i2.302
Section
Articles