Proteksi Keamanan Data dengan Menerapkan Algoritma Bacon Cipher dan ROT128

  • Indra Rahmatsyah * Mail Prodi Teknik Informatika, Fakultas Teknik dan Komputer, Universitas Harapan Medan, Indonesia
  • Yunita Sari Siregar Prodi Teknik Informatika, Fakultas Teknik dan Komputer, Universitas Harapan Medan, Indonesia
  • Khairunnisa Khairunnisa Prodi Teknik Informatika, Fakultas Teknik dan Komputer, Universitas Harapan Medan, Indonesia
Keywords: Steganography; Cryptography; Bacon Cipher; ROT128

Abstract

The data storage and information exchange activities digitally have risks and of course must be accompanied by information security. Various ways are done to protect data such as hiding data with steganography techniques or by encoding data with cryptographic techniques. If in general the steganography technique is done by inserting data into image, audio or video media, but in this study the data will be inserted or hidden into a text file as a media (cover message) to hide the data. While data security with cryptographic techniques is done by changing the data to be kept secret (plaintext) into encoded data (ciphertext) so that the data cannot be understood by people who do not have legality in the data. Therefore, with this method of securing research files, it produces a test of blackbox testing of encryption and description and extraction. Where is the result of the encryption on the encrypted text file using the ROT128 algorithm with a time of 1.82ms and where is the result of the description on the text file producing a decrypted text file using the ROT128 algorithm with a time of 1.47ms. After carrying out the extraction process on the resulting text file description using the Bacon Cipher algorithm, it will produce the original text with a time of 13.95ms

References

Wahyu Kleaver Lase, Hendri, “Penerapan Metode Algoritma Spread Spectrum Untuk Menyembunyikan Pesan Terenkripsi Algoritma RC4A,” Journal Global Tecnology Computer., vol. 1, no. 1, pp. 1–12, 2021.

Maland Aresta, Redho Pratomo, Wahyu Geraldino, Vicky Santoso, Joko Dwi, “IMPLEMENTASI MULTI ENKRIPSI ROT 13 PADA SYMBOL WHATSAPP,” JOISM : JURNAL OF INFORMATION SYSTEM MANAGEMENTe-ISSN: 2715-3088Vol 2., No. 1., pp. 2715–3088, 2020.

Amin, M Miftakul, “IMPLEMENTASI KRIPTOGRAFI KLASIK PADA KOMUNIKASI BERBASIS TEKS,” Jurnal Pseudocode, vol. 2, 2016

Sugiarto, E.Setiadi, D.R.I.M. Fahmi, A. Rachmawanto, E.H. Sari, C.A. Sarker, Md K.Widjajanto, “Securing Text Messages using the Beaufort-Vigenere Hybrid Method,” 10.1088/1742-6596/1577/1/012032,ISSN 17426596,PUI 632490000.

Sumiati, Mia Abdillah, Rahman Cahyo, Alqomari “Pemodelan UML untuk Sistem Informasi Persewaan Alat Pesta,” ISSN 2089-3353.

Kurniawan, Tri Astoto, “Pemodelan Use Case (UML): Evaluasi Terhadap beberapa Kesalahan dalam Praktik,”DOI 10.25126/jtiik.201851610, ISSN:23557699, Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 5, Issue. 1, pp.77,2018

WAHYUDI, WAHYUDI RAHMAN, ABDUR NAWAWI, MUHAMMAD (2018). Perbandingan Nilai Ukur Sensor Load Cell pada Alat Penyortir Buah Otomatis terhadap Timbangan Manual. Journal ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika, 5(2), 207.

Putera, Andysah Siahaan, Utama Ramadhan, Zuhri, “Protection of Important Data and Information using Gronsfeld Cipher Determination of Education Scholarship Recipients Using Preference Selection Index View project INTERNATIONAL JOURNAL FOR INNOVATIVE RESEARCH IN MULTIDISCIPLINARY FIELD Protection of Important Data and Information using Gronsfeld Cipher,” DOI 10.31227/osf.io/uq7nt), ISSN: 2455-0620.

Sinaga, Berliana Oktaviani Almahera, Doni Wahyuni, Sri Saputra, Imam, “Seminar Nasional Teknologi Komputer & Sains (SAINTEKS) Pengamanan File Docx Menerapkan Algoritma Gronsfeld,”ISBN 978-602-52720-7-3.

Putri, Ranti Eka Putera, Andysah Siahaan, Utama , “Three-Pass Protocol Scheme using Gronsfeld and Vigenere Ciphers Heuristic Function Influence to the Global Optimum Value in Shortest Path Problem View project Decision Support Systems View project Three-Pass Protocol Scheme using Gronsfeld and Vigenere Ciphers,” ISSN: 2395-6011, Article in Indian Journal of Scientific Research, vol. 4, Issue. 10, pp. 223–228, 2018.

Inovasi Penelitian, Jurnal Ilham Budiman, Oleh Saori, Sopyan Nurul Anwar, Ramdan Yuga Pangestu, Muhammad, Administrasi Bisnis, Jurusan Ilmu Administrasi dan Humaniora, “ANALISIS PENGENDALIAN MUTU DI BIDANG INDUSTRI MAKANAN (Studi Kasus: UMKM Mochi Kaswari Lampion Kota Sukabumi),” ISSN: 2722-9467.

Rosal, Desetiadi, Ignatius Moses Jatmoko, Cahaya Rachmawanto, Eko Hari Sari, Christy Atika, “KOMBINASI CIPHER SUBTITUSI (BEAUFORT DAN VIGENERE) PADA CITRA DIGITAL,”ISBN 978-979-3649-99-3,2018.

Cipher, Optimalisasi Beaufort, Diana, Mia Zebua, Taronisokhi, “Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS,”, pp. 12–22, 2018.

Fadlan, Muhammad, Sinawati, Sinawati, Indriani, Aida, Bintari, Evi Dianti, “PENGAMANAN DATA TEKS MELALUI PERPADUAN ALGORITMA BEAUFORT DAN CAESAR CIPHER,” JURNAL TEKNIK INFORMATIKA), vol. 12, Issue. 2, pp. 149–158, 2019.

Sumber, Pengembangan Menuju, Daya Madani, Masyarakat Lokal, Berkearifan, Irawan, Candra, Eko, Rachmawanto, Hari Christy, Sari, Atika Castaka, Sugianto, Agus, “SUPER ENKRIPSI FILE DOKUMEN MENGGUNAKAN BEAUFORT CIPHER DAN TRANSPOSISI KOLOM SUPER ENCRYPTION DOCUMENT FILE USING BEAUFORT CIPHER AND COLUMNAR TRANSPOSITION 1),” ISBN 978-602-6697-66-0.

Luih, J. R., Haryani, C. A., & Widjaja, A. E. (2022). Penerapan teknologi qr code berbasis web pada sistem manajemen inventaris di gudang pt xyz. Technomedia Journal, 7(2 October), 202-215.

Ariyanto, F., & Suprihadi, S. (2022). IMPLEMENTASI DIGITAL SIGNATURE DAN QUICK RESPONSE CODE PADA APLIKASI KUITANSI DIGITAL. JIKO (Jurnal Informatika dan Komputer), 5(2), 125-131.

Mahendra, G. S., Wali, M., Idwan, H., Listartha, I. M. E., Yuliastuti, G. E., Sasongko, D., & Saskara, G. A. J. (2022). Keamanan Komputer'. Galiono Digdaya.

Dimensions Badge
Published
2024-02-26
Section
Articles