Pembangkitan Kunci Beaufort Cipher Dengan Teknik Blum-blum Shub pada Pengamanan Citra Digital
Abstract
Data security is not only due to the complexity of the algorithms used, but one of the most important factors is the security of the keys used. One of the most popular data that needs to be backed up today is digital images. However, these days, the algorithms used to back up data are often attacked. This is because the structure of the key formations used is still weak. One of the data security algorithms that form a simple key is the Beaufort cipher. It relies on the duplication of key characters to form the key for each protected element. Key generators based on blum-blum shub technology can generate very random and difficult-to-guess keys, so the strength of the keys you use can enhance the resilience of protected data. Keys generated based on blum-blum shub technology will later be used in the process of encrypting and decrypting pixel values in digital images.
References
E. N. T. Guruh M Arindra Pratama, “No Title,” Metod. Catalan Number dan Double Columnar, vol. 4, no. 5, pp. 31–40, 2015.
T. Zebua, “Encoding the Record Database of Computer Based Test Exam Based on Spritz Algorithm,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 9, no. 1, p. 52, 2018, doi: doi: 10.24843/lkjiti.2018.v09.i01.p06.
B. S. I. M. Arrijal and R. Efendi, “Penerapan Algoritma Kriptografi Kunci Simetris dengan Modifikasi Vigenere Cipher dalam Aplikasi Kriptografi Teks,” J. Pseudocode, vol. 3, no. 1, pp. 69–82, 2016, doi: 10.33369/pseudocode.3.1.69-82.
M. Diana and T. Zebua, “Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS,” J. Sains Komput. Inform., vol. 2, no. 1, pp. 12–22, 2018.
M. B. Sanjaya and P. A. Telnoni, “Implementasi Random Number Blum-Blum-Shub dan Chaotic Function untuk Modifikasi Key Generating pada Kriptografi AES,” J. Elektro Telekomun. Ter. Desember, vol. 1, no. 3, pp. 154–165, 2015.
B. Aïssa, “Implementation of Blum Blum Shub Generator for Message Encryption,” Int. Conf. Control. Enginering Inf. Tecknology (CEIT’ 14), vol. 1, no. 4, p. 2014.
E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab. Yogyakarta: Andi, 2015.
R. A. R. U. Marsal and F. Arnia, “Enkripsi dan Dekripsi Citra Menggunakan Modifikasi Algoritma Vigenere Cipher,” KITEKTRO J. Online Tek. Elektro, vol. 3, no. 3, pp. 6–10, 2018.
H. Mukhtar, Kriptografi untuk Keamanan Data, 1st ed. Yogyakarta: CV. Budi Utama, 2018.
Wikipedia, “Beaufort Cipher,” https://en.wikipedia.org/wiki/ Beaufort_cipher, 2020. [Accessed 17 February 2021].
E. Apriliana, “Kombinasi Algoritma One Time Pad dengan Pembangkit Kunci Blum Blum Shub,” J. Inform. Bandung, vol. 1, no. 70, pp. 11–20, 2016.
A. Hoerudin, “Game Puzzle Makanan Tradisional Dengan Menggunakan Algoritma Blum Blum Shub sebagai Pengacakan Gambar,” J. Fak. Ilmu Komput. Jakarta, vol. 1, no. 6, pp. 1–8, 2010.
T. S. Waruwu and K. Telaumbanua, “Kombinasi Algoritma OTP Cipher dan Algoritma BBS dalam Pengamanan File,” JSM STIMIK Mikroskil, vol. 17, no. 1, pp. 119–126, 2016.
H. Y. A. Sinaga and L. Sitorus, “Pengamanan File Citra Digital Dengan Menggunakan Metode Least Significant Bit Dan End Of File,” J. Tek. Inform. Unika St. Thomas, vol. 2, no. 2, pp. 33–41, 2017.
Aldo and L. Hakim, “Implementasi Steganografi Pada Citra Digital dan Kriptografi Algoritma Hill Cipher Untuk Pengamanan Informasi Berupa Text,” J. Ilm. Teknol. Inf. Terap., vol. V, no. 1, pp. 6–17, 2018.
Copyright (c) 2022 Taronisokhi Zebua, Eferoni Ndruru

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


.png)
.png)


