Kombinasi Metode RSA, Secret Sharingasmuth-Bloom Dan Redundant Pattern Encoding Untuk Mengamankan Pesan
Abstract
The combination of algorithms is the process of combining more than one algorithm so that the resulting level of security is better. This study combines 3 direct algorithms so that the level of defense in data security is more optimal. The combined algorithms in this study are the RSA algorithm, secret sharing asmuth-bloom, and redundant pattern encoding. This study describes how the procedure is carried out to combine the three algorithms above, namely RSA, secret sharing asmuth-bloom, and redundant pattern encoding. The combination process is carried out in stages by carrying out the encryption process using RSA first, then the results of the encryption are encrypted again using secret sharing asuth-bloom, resulting in a new ciphertext and then the new ciphertext is inserted into an image using the redundant pattern encoding method. The result of this study is to design a data-based security application using a combination of the RSA algorithm, secret sharing asmuth-bloom, and redundant pattern encoding. This application can be used to secure data in the form of text, so that it cannot be taken by others. In addition, the application that will be designed is easier to use in data security.
References
K. dan A. Kinoyo, Tuntutan Praktis Membangun Sistem Informasi Akutansi dengan Mikrosoft Visual Basic & SQL, Server. Andi, 2007.
H. Mukhtar, Kriptografi untuk Keamanan Data, 1st ed. Yogyakarta: CV Budi Utama, 2018.
T. D. U. M. Buana, “Kriptografi,” Pus. Bahan Ajar dan Learn., vol. 2, no. 5, p. 206, 2010.
M. D. Irawan, “Implementasi Kriptografi Vigenere Cipher dengan PHP,” J. Teknol. Inf., vol. 1, no. 1, p. 11, 2017, doi: 10.36294/jurti.v1i1.21.
I. M. Arrijal, R. Efendi, and B. Susilo, “Penerapan Algoritma Kriptografi Kunci Simetris dengan Modifikasi Vigenere Cipher dalam Aplikasi Kriptografi Teks,” J. Pseudocode, vol. 3, no. 1, pp. 69–82, 2016, doi: 10.33369/pseudocode.3.1.69-82.
F. R. Andhika, “Modifikasi Vigenere Cipher dengan Menggunakan Caesar Cipher dan Enkripsi Berlanjut untuk Pembentukan Key,” Pelita Inform. Intstitut Teknol. Bandung, vol. 4, no. 5, pp. 1–8, 2011.
A. E. Putra, “Fungsi Hash pada Kriptografi,” J. Inform. Inst. Teknol. Bandung, vol. 1, no. 1, pp. 1–6, 2009.
A. R. C, Algoritma dan Pemrograman dengan Bahasa C, I. Yogyakarta: ANDI Yogyakarta, 2010.
M. Pratama et al., “PENERAPAN METODE SECRET SHARING ASMUTH-BLOOM UNTUK PENGAMANAN DATA TEKS,” vol. 6, pp. 4–7, 2017.
I. Saputra and N. Manalu, “Pengamanan Transfer File Menggunakan Secret Sharing Asmuth-Bloom,” vol. 1, pp. 426–428, 2020.
M. K. Stefanus Yerian Elandha, Magdalena A. Ineke Pakereng, “Perancangan dan Implementasi Steganografi Menggunakan Metode Redundant Pattern Encoding dengan Algoritma AES ( Advanced Encryption Standard ) Artikel Ilmiah Perancangan dan Implementasi Steganografi Menggunakan Metode Redundant Pattern Encoding dengan Alg,” Kumpul. J. TI, vol. 1, no. 1, 2016.
E. F. Nugraha, I. T. Bandung, and J. G. Bandung, “Meningkatkan Kapasistas Pesan yang disisipkan dengan Metode Redundant Pattern Encoding,” J. Inst. Teknol. Bandung, vol. 1, no. 11, 2011.
M. Z. Riyanto, “Bilangan Prima dan Teorema Fundamental Aritmatika Bilangan Prima,” no. 5, pp. 1–8, 2017.
F. Zunaidi, “Buku Pintar Aritmatika Modular,” J. Ilmu Mat., vol. 3, no. 7, 2006.
T. Sutabri, Konsep Sistem Informasi, I. Yogyakarta: ANDI Yogyakarta, 2012.
H. E. Dwiyanto, “Format File,” Teknol. J., vol. 1, no. 2, pp. 1–5, 2020.
M. S. Rossa A. S, Rekayasa Perangkat Lunak, I. Bandung: Informatika Bandung, 2013.
A. Nugoro, Rekayasa Perangakat Lunak Menggnakan UML dan Java, 1st ed. Yogyakarta: ANDI, 2009.
J. HM., Analisa dan Desain Sistem Informasi, 5th ed. Yogyakarta: ANDI, 2005.
I Ketut Darmayuda, Pemrograman Aplikasi Database Microsoft Visual Basic.Net, Bandung, Informatika, 2010.
Copyright (c) 2022 Muhammad Zairy Lubis

This work is licensed under a Creative Commons Attribution 4.0 International License.