Sistem Keamanan Data Text Dengan Data Encryption Standard (DES) dan Metode Least Significant Bit (LSB)
Abstract views: 1216 , pdf downloads: 868Abstract
Abstract
Current information can be delivered quickly without knowing the geographical boundaries using the internet. However, the information transmitted can be intercepted by the middle of the road which is not desired, then the security of the data actually becomes a very important issue. The development of computer systems and networks and the interconnection through the Internet has increased, of course, require data security and reliable message in order to avoid the attack. To secure internet data or message network necessary cryptographic encryption methods, one method of data encryption that there is a method of data encryption standard (DES) and subsequently inserted into the Lakeside digital images (steganography) using the method of least significant bit (LSB).
Downloads
References
[2] U. R. S. Lubis, Mesran, and T. Zebua, “Implementasi Algoritma Chua Chaotic Noise Pada Enkripsi Citra RGB,” KOMIK (Konferensi Nas. Teknol. Inf. dan Komputer), vol. 1, no. 1, pp. 220–224, 2017.
[3] N. Widyastuti, “Pengembangan Metode Beaufort Cipher Menggunakan Pembangkit Kunci Chaos,” J.Teknol, vol. 7, no. 1, pp. 73–82, 2014.
[4] S. S. Ahmad, “Steganography for Inserting Message on Digital Image Using Least Significant Bit and AES Cryptographic Algorithm,” 2016 4th Int. Conf. Cyber IT Serv. Manag., pp. 1–6.
[5] F. Li and P. Ming, “A simplified FPGA implementation based on an Improved DES algorithm,” in 3rd International Conference on IEEE Genetic and Evolutionary Computing, 2009, pp. 227–230.
[6] W. Stallings and L. Brown, Computer Security Principle and Practice. Pearson Education, 2008.
[7] S. Taherkhani, E. Ever, and O. Gemikonakli, “Implementation of Non-Pipelined and Pipelined Data Encryption Standard ( DES ) Using Xilinx Virtex-6 FPGA Technology,” 2010 10th IEEE Int. Conf. Comput. Inf. Technol., no. Cit, pp. 1257–1262, 2010.
[8] J. Zhang and X. Jin, “Encryption System Design Based On DES And SHA-1,” 2012 11th Int. Symp. Distrib. Comput. Appl. to Business, Eng. Sci., pp. 317–320, 2012.
[9] I. Marzuki, “Perancangan dan Implementasi Sistem Keamanan Jaringan Komputer Menggunakan Metode Port Knocking Pada Sistem Operasi Linux,” J. Teknol. Inf. Indones., vol. 2, no. 2, pp. 18–24, 2017.
[10] T. Popeea, V. Olteanu, L. Gheorghe, and R. Rughiniș, “Extension of a port knocking client-server architecture with NTP synchronization,” 2011 RoEduNet Int. Conf. 10th Ed. Netw. Educ. Res., pp. 1–5.
[11] S.Douglas, Cryptography: Theory and Practice. CRC Press, 1995.
[12] N. Kumar and B. V. Gopal, “VLSI Implementation of Data Encryption Standard Algorithm,” Int. J. Innov. Technol. Explor. Eng., vol. 1, no. 6, pp. 106–110.
[13] S. Oukili, “FPGA implementation of Data Encryption Standard using time variable permutations,” 2015 27th Int. Conf. Microelectron., pp. 126–129.
[14] S. T, M. Edy, S. Vincent, N. Dwi, and Wijanarto, Teori Pengenalan Citra Digital, 1st ed. Yogyakarta: C.V ANDI OFFSET, 2009.
[15] M. Zunaidi, “Steganografi, Menyembunyikan Pesan atau File Dalam Gambar Menggunakan Command/DOS,” J. Ilm. SAINTIKOM, pp. 11–16, 2013.
[16] F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks , Isi File Dokumen , Dan File Dokumen Menggunakan Algoritma Advanced Encryption ENCRYPTION,” J. Inform. Mulawarman, vol. 10, no. 1, pp. 20–13, 2015.
[17] Ariyus and Dony, Pengantar Ilmu Kriptografi Teori Analisis dan Implementasi, 1st ed. Yogyakarta: C.V ANDI OFFSET, 2008.
[18] M. M. Amin, “Implementasi Kriptografi Klasik pada Komunikasi Berbasis Teks,” J. Pseudocode, vol. III, no. 2, pp. 129–136, 2016.
[19] N. R. Yanti, Alimah, and D. A. Ritonga, “Implementasi Algoritma Data Encryption Standard Pada Penyandian Record Database,” J. Sains Komput. Inform., vol. 2, no. 1, pp. 23–32, 2018.
[20] Menezes, Oorcshot, and Vanstone, Handbook of Applied Cryptography. USA: CSR Press Inc., 1996.
[21] R. Munir, Pengolahan Citra Dengan Pendekatan Algoritmik. Bandung: Informatika, 2004.