Pengamanan Data melalui Model Super Enkripsi Autokey Cipher dan Transposisi Kolom

2021 ◽  
Vol 5 (6) ◽  
pp. 1113-1119
Author(s):  
Muhammad Fadlan ◽  
Haryansyah ◽  
Rosmini

One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly used, namely substitution techniques and transposition techniques. One of the weaknesses of the basic cryptographic techniques is the lower level of data security. This study proposed a super encryption model in securing data by combining cryptographic algorithms with substitution techniques, i.e., autokey cipher and transposition, i.e., columnar transposition cipher. This study used the Avalanche Effect method as a measurement tool for the proposed super encryption model. The test results have shown that the proposed super encryption model can provide a better level of security. The avalanche effect test on the five data test shows that the average AE value of the proposed super encryption model is 30.76%. This value is higher than the single autokey cipher algorithm of 1.66% and column transposition with a value of 18.03%. Other results from the five data test have shown that the proposed model has a high level of accuracy of 100% in terms of the decryption process results, which is the same as the initial data before going through the encryption process.  

2021 ◽  
Vol 13 ◽  
Author(s):  
Proteeti Das ◽  
Najmul Hoque Munshi ◽  
Subhasis Maitra

Aims: Cryptography means 'hidden secrets'. The primary purpose of cryptography is to protect network and data over a wireless communication channel. The cryptographic approach secures the data of a network from any internal or external attacks. Background: There are several kinds of cryptographic techniques that are Data Encryption Standard (DES), RSA (Rivest- Shamir- Adleman), Advanced Encryption Standard (AES), Blowfish, Twofish etc. Out of these algorithms, AES shows wide acceptance for its superiority in providing confidentiality to secret information. Another cause for extensive acceptance is, AES is simple, convenient to implement, low charge and higher security. Several changes have been proposed to modify in recent times by cryptographers and researchers all around the world. Objective: This research paper offers a new key-dependent s-box generation algorithm for AES. Methods: A list of irreducible polynomials of degree 8 is used to generate the s-box depending on the secret key to provide more invulnerable ciphertext in comparison to standard AES. This design of this proposed model is easy and convenient to implement than different dynamic s-box technology algorithm. Results : The metrics chosen for overall performance evaluation are Frequency Distribution, Chi-square Test, Avalanche Effect, and Strict Avalanche Criterion. Conclusion: The proposed algorithm satisfies the desired property of these metrics and provides better security in contrast to standard AES.


2021 ◽  
Vol 5 (3) ◽  
pp. 806
Author(s):  
Muhammad Fadlan ◽  
Rosmini Rosmini ◽  
Haryansyah Haryansyah

Data security is an important thing that must be done in the cyber era. The use of various kinds of digital technology in helping various human activities needs to be balanced with adequate data security. One of the ways that can be used in securing data is through cryptography. Atbash cipher is one of the cryptographic techniques used in securing data. However, this algorithm has a weakness because it only uses the process of reversing the position of the characters to be secured. This study proposes a cryptographic model that can maximize data security from the atbash cipher. The proposed model is a combination of the atbash cipher with the autokey cipher. The tests carried out on the proposed model have a 100% success rate, meaning that the encrypted message resulting from the proposed encryption process has been successfully restored to its original form through the proposed decryption process. The results of this study indicate that the atbash cipher cryptographic algorithm, combined with the autokey cipher algorithm can produce an encrypted message that is more difficult to crack.


Author(s):  
Rama Aria Megantara ◽  
Fauzi Adi Rafrastara ◽  
Syafrie Naufal Mahendra

The progress of the development of digital technology today, many people communicate by sending and receiving messages. However, along with extensive technological developments, many crimes were committed. In avoiding these crimes, data security needs to be done. Form of data security in the form of cryptography and steganography. One of the cryptographic techniques is the hill cipher algorithm. Hill ciphers include classic cryptographic algorithms that are very difficult to solve. While the most popular steganography technique is Least Significant Bit (LSB). Least Significant Bit (LSB) is a spatial domain steganography technique using substitution methods. This study discusses the merging of message security with hill cipher and LSB. The message used is 24-bit color image for steganography and text with 32, 64 and 128 characters for cryptography. The measuring instruments used in this study are MSE, PSNR, Entropy and travel time (CPU time). Test results prove an increase in security without too damaging the image. This is evidenced by the results of the MSE trial which has a value far below the value 1, the PSNR is> 64 db, the entropy value ranges from 5 to 7 and the results of travel time <1 second.


2021 ◽  
Vol 2 (2) ◽  
pp. 30-39
Author(s):  
Nita Suliyani ◽  
◽  
Sri Wahyu Suciyati ◽  
Gurum Ahmad Pauzi ◽  
Arif Surtono

In this research, the water turbidity measurement tool based on Arduino Uno has been designed and built using phototransistors and infrared LEDs. This measuring instrument consists of a series of infrared sensors, Arduino as a process, LCD I2C as a value viewer, Micro SD as a data storage, and RTC as a timer. This study used two water samples with various concentrations. The sample used, namely distilled water plus impurities in the form of soil and ash. The distilled water used is still 100 ml with variations in the concentration of impurities ranging from 0,1-0,9 gr. Sensor test results show that the greater the turbidity level, the greater the voltage obtained. Sensor scanning ranges from 2,02 V-4,00 V for groundwater and 2,02 V-4,31 V for ash water. The reading uses a standard measuring instrument for groundwater ranging from 0 NTU to 331,4 NTU, while for ash water ranging from 0 NTU to 284,4 NTU. Data from the sensor test results in an equation used to convert the artificial measuring instrument's voltage value into a turbidity value. Then, data is taken using the same sample, so groundwater's turbidity value was obtained from 0 NTU to 318,94 NTU while for ash water from 0 NTU to 285,13 NTU. Based on the results, average accuracy for water was obtained. Soil amounted to 94,66%, while for ash water was 96,63%.


Repositor ◽  
2019 ◽  
Vol 1 (2) ◽  
pp. 117
Author(s):  
Sofyan Arifianto ◽  
Shinta Permatasari ◽  
Aminudin Aminudin

 Data is a file that can be confidential so it requires a data security process to maintain confidentiality.  Kripotgrrafi is a data security process that can be used based on the use of algorithms, one of which is AES.  AES is a modern algorithm that can be modified to improve confusion and diffusion in cryptography.  AES combination can be done using Polybius which has cryptographic diffusion properties.  This study modified the AES using 6x6 and 10x10 polybius matrices that were performed on plaintext and plaintext and keys.  Analysis was carried out based on the highest bit change rate found in modification II in the plaintext and 6x6 matrix keys, which amounted to 51.8% using the avalanche effect test.  The results of the AE compared to the expected results using chi square with the modified AES results can increase the AE by 5% with the real level is 0,05 and the degree of freedom is 4 . Execution time was tested in this study with the results of the AES modification time longer than the standard AES because the complexity of the algorithm affects both encryption and decryption time.Abstract Data is a file that can be confidential so it requires a data security process to maintain confidentiality.  Kripotgrrafi is a data security process that can be used based on the use of algorithms, one of which is AES.  AES is a modern algorithm that can be modified to improve confusion and diffusion in cryptography.  AES combination can be done using Polybius which has cryptographic diffusion properties.  This study modified the AES using 6x6 and 10x10 polybius matrices that were performed on plaintext and plaintext and keys.  Analysis was carried out based on the highest bit change rate found in modification II in the plaintext and 6x6 matrix keys, which amounted to 51.8% using the avalanche effect test.  The results of the AE compared to the expected results using chi square with the modified AES results can increase the AE by 5% with the real level is 0,05 and the degree of freedom is 4 . Execution time was tested in this study with the results of the AES modification time longer than the standard AES because the complexity of the algorithm affects both encryption and decryption time.


2021 ◽  
Vol 7 (2) ◽  
pp. 563
Author(s):  
Lilah Holilah ◽  
Rhini Fatmasari ◽  
Tita Rosita

<p>Penelitian ini bertujuan untuk menganalisis pengaruh kepemimpinan karismatik dan kompetensi kepribadian terhadap disiplin kerja guru sekolah dasar. Data dianalisis dengan menggunakan statistic deskriptif dan inferensial yaitu SEM dan analisis jalur (metode simultan yaitu uji-F). Hasil penelitian menunjukkan bahwa: (1) Kepemimpinan Karismatik berpengaruh signifikan dan positif diterima terhadap disiplin kerja guru, hal ini dapat dibuktikan dengan T<sub>hitung </sub>&gt;T<sub>tabel </sub>(3,49&gt;1,97) dan nilai koefisien loading faktor  sebesar 0,33; (2) kompetensi kepribadian guru berpengaruh signifikan dan positif diterima, hal ini dapat dibuktikan  dengan T<sub>hitung </sub>&gt;T<sub>tabel </sub>(6,67&gt;1,97) dan nilai koefisien loading faktor 0,65; (3) hasil uji bersama-sama kepemimpin karismatik dan kompetensi kepribadian guru berpengaruh signifikan terhadap disiplin kerja guru, hal ini dapat dibuktikan  dengan F hitung sebesar 5.155, nilai prob&lt;alpha (0.007&lt;5%), dan nilai R-square sebesar 51,44% sudah baik karena memiliki nilai lebih dari 50%. Dapat disimpulkan bahwa kepemimpinan karismatik dan kompetensi kepribadian guru yang baik memiliki tingkat disiplin kerja guru yang tinggi.</p><p><em>The research aims to analyze the influences charismatic leadership and personality competence of teacher towards the discipline of work of states elementary teacher. The primary data were analyzed by using descriptive and inferential statistics that is SEM and path analysis (simultan method that is uji-F).  The result showed that: Firt, charismatic leadership significant influence and be accepted positively on the discipline of work of states elementary teacher, this was proved by  T<sub>hitung </sub>&gt;T<sub>tabel </sub>(3,49&gt;1,97) and factor loading coefficient value equal to 0,33. Secondly, personality competence of teacher significant influence and be accepted positively on the discipline of work of states elementary teacher, this was proved by T<sub>hitung </sub>&gt;T<sub>tabel </sub>(6,67&gt;1,97) dan factor loading coefficient value equal to 0,65. Third, the test results together charismatic leadership and personality competence of teacher towards the discipline of work of states elementary teacher, this was proved by F hitung amounting to 5.155, prob score&lt;alpha (0.007&lt;5%), dan R-square equal to 51,44% is good because it has a value of more than 50%. So it can be concluded that charismatic leadership and good teacher personality competence have a high level of teacher work discipline.</em></p>


Author(s):  
Ery Safrianti ◽  
Fernanda Fitriansyah

Android phone is one of the most widely used telecommunications devices today. The exchange of various forms of information ranging from text, sound, images and video through this media is inseparable from the threat of criminal crime through digital data theft. Data security aspects are very important to be considered, one of which is data in the form of text. Text data is commonly used in short message services (SMS), chat in various Android applications or in the use of logins and passwords. This research will create an application on Android for securing text data through cryptographic techniques with a layered algorithm using three types of algorithms namely Caesar, Blowfish and AES Algorithms (Advanced Standard Encryption). This application can run on Android 5.0 (lollipop) or above, which can be used to encrypt and decrypt text messages. The test results show that the results of the initial text that was encoded through the encryption process can be safely returned by the decryption process without the slightest mistake with the original text.  The encryption test for capital letters, numbers, and punctuation can be completely decrypted.


2020 ◽  
Vol 5 (3) ◽  
pp. 153
Author(s):  
Intan Fitriani ◽  
Aryo Baskoro Utomo

Along with the development of technology, Short Message Service (SMS) has begun to be used to communicate between someone and the system in an agency. But in some cases, the security of messages sent through the SMS application has not been well protected. To improve data security and confidentiality, cryptographic algorithms with Advanced Encryption Standard (AES) can be done. The method used is the Waterfall method. AES encryption testing is done by comparing the manual calculations and the results of the encryption on the system. Blackbox test, CrackStation test, and Avalanche Effect (AE) test were also carried out. Brute force test results using CrackStation software that ciphertext cannot be solved. And in the avalanche effect (AE) test, the AE value of each 128-bit AES key is 44.53%, 192-bit is 48.44%, and 256-bit is 56.25%. Therefore, 192-bit and 256-bit AES keys are recommended for use because AE values are in the range of 45% - 60%.


Author(s):  
Ni Putu Dian Permata Prasetyaningrum

Surabaya Shipping Polytechnic emphasizes on certain areas of expertise that Taruna must possess. This is the basis after graduating from shipping polytechnics, cadets must have expertise and skills. The purpose of this study was to study the effect of inquiry, discovery learning, and creativity levels on the ability to write descriptive essays on nautical and technical cadets at Surabaya Shipping Polytechnic. This type of research is research. This research uses quantitative methods using experiments. The location used in this research is Surabaya Shipping Polytechnic. The subjects in this study were the cadets of the Nautika A, Nautika B, Teknika A, and Teknika B. classes. Based on the results of the research and discussion, the following conclusions are obtained: There are those that can be solved looking for description essays in the cadets. learning discovery method. The test results show better investigation methods than the discovery of learning, There is a difference in the ability to write a description essay about cadets who have a high level of creativity with cadets who have a low level of creativity, the test results show better who have a high level of creativity, there are related with learning methods and descriptions of the ability to write essay descriptions, the test results show learning methods and creativity descriptions of the ability to write essay descriptions.


2018 ◽  
Vol 46 (3) ◽  
pp. 174-219 ◽  
Author(s):  
Bin Li ◽  
Xiaobo Yang ◽  
James Yang ◽  
Yunqing Zhang ◽  
Zeyu Ma

ABSTRACT The tire model is essential for accurate and efficient vehicle dynamic simulation. In this article, an in-plane flexible ring tire model is proposed, in which the tire is composed of a rigid rim, a number of discretized lumped mass belt points, and numerous massless tread blocks attached on the belt. One set of tire model parameters is identified by approaching the predicted results with ADAMS® FTire virtual test results for one particular cleat test through the particle swarm method using MATLAB®. Based on the identified parameters, the tire model is further validated by comparing the predicted results with FTire for the static load-deflection tests and other cleat tests. Finally, several important aspects regarding the proposed model are discussed.


Sign in / Sign up

Export Citation Format

Share Document