scholarly journals Data Security with International Data Encryption Algorithm

2017 ◽  
Author(s):  
Robbi Rahim ◽  
Mesran Mesran ◽  
Andysah Putera Utama Siahaan

Information security is very important nowadays, how to secure data certainly requires a technique one of which is the use of cryptography, IDEA algorithm is one of cryptographic algorithms that can be used to secure the message, and in this research IDEA algorithm process is displayed gradually to facilitate the development of IDEA algorithm in various purposes

Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


2021 ◽  
Vol 15 (2) ◽  
pp. 65-75
Author(s):  
Maulyanda Az ◽  
Syafrial Fachri Pane ◽  
Rolly Maulana Awangga

Abstrak Penelitian ini membantu dalam melalukan proses Keamanan data atau informasi untuk menjamin kerahasiaan dan keaslian data atau informasi. Dalam perancangan ini menggunakan Kriptografi sebagai salah satu solusi dalam mengamankan data atau informasi. Metode kriptografi digunakan untuk mempersatukan algoritma Md5, Base64 serta AES (Advanced Encryption Standard). Kombinasi dari tiga algoritma menghasilkan ciphertext, yang dapat mengamankan data dari proses tag NFC. Penelitian ini menggunakan metodologi penelitian yang dapat menyatakan bahwa sistem yang dibangun dapat berfungsi dengan baik dan untuk keamanan nya aman digunakan, dari hasil penerapannya didapatkan hasil persentase keberhasilan 100%. Jadi, penelitian ini mampu menjawab permasalahan yang terjadi pada sistem keamanan data. Abstract This research helps in carrying out data or information security to ensure the confidentiality and authenticity of data or information. This design uses Cryptography as a solution in securing data or information. Cryptographic methods to unify the Md5, Base64, and AES (Advanced Encryption Standard) algorithms. The combination of the three algorithms produces ciphertext, which can secure data from the NFC tag process. This study uses a research methodology that can state that the system built can function correctly, and for security, it is safe to use because it has a 100% success percentage. So, this researchable to answer the problems that occur in the data security system.


JURTEKSI ◽  
2019 ◽  
Vol 6 (1) ◽  
pp. 1-10
Author(s):  
Sebastian Suhandinata ◽  
Reyhan Achmad Rizal ◽  
Dedy Ongky Wijaya ◽  
Prabhu Warren ◽  
Srinjiwi Srinjiwi

Abstract:Computer data security relies on preventing data theft from irresponsible parties by using cryptography method. Some cryptography algorithms have good and poor performance in encrypting and decrypting data depending on the key types. Therefore the purpose of this research is to measure the performance of the hybrid algorithm, consisting a symmetric keyBlowfish algorithm and an asymmetric key RSA algorithm, in encrypting and decrypting multiple types of data such as documents, photos, audios, and videos. The result is the performance of the hybrid algorithm is almost on par with Blowfish and provides a more secure data encryption and decryption by taking advantage of RSA algorithm. The average encryption performance of hybrid algorithm is 0.85s on document, 1.06s on photo, 3.38s on audio, and 15.56s on video. While the average decryption performance of hybrid algorithm is 1.01s on document, 1.38s on photo, 4.3s on audio, and 27.56s on video.            Keywords:Hybrid cryptography, Data security, Performance, Blowfish, RSA  Abstrak:Keamanan data komputer berhubungan dengan pencegahan dari pencurian data oleh pihak yang tidak bertanggung jawab, salah satu cara pengamanan data komputer yaitu dengan teknik kriptografi. Beberapa metode kriptografi memiliki performa yang baik dan buruk tergantung dengan tipe kuncinya. Maka dari itu, tujuan dari penelitian ini adalah mengukur tingkat kecepatan kriptografi hybrid, terdiri dari algoritma simetris Blowfish dan algoritma asimetris RSA, dengan beberapa tipe data seperti dokumen, foto, audio dan video. Hasil dari penelitian ini adalah algoritma hybrid memiliki performa yang tidak jauh berbeda dari algoritma Blowfish dan membuat proses enkripsi dan dekripsi data lebih aman dengan keunggulan dari algoritma RSA. Rata-rata kecepatan enkripsi algoritma hybrid untuk dokumen 0,85 detik, gambar 1,06 detik, audio 3,38 detik, dan video 15,56 detik. Sedangkan rata-rata kecepatan dekripsi algoritma hybrid untuk dokumen 1,01 detik, gambar 1,38 detik, audio 4,3 detik, dan video 27,56 detik. Kata kunci:Kriptografihybrid, Keamanan data, Performa, Blowfish, RSA 


2018 ◽  
Vol 2 (1) ◽  
pp. 23
Author(s):  
Neti Rusri Yanti ◽  
Alimah Alimah ◽  
Desi Afrida Ritonga

Record databases are generally still often displayed in text form as information for users, so it can facilitate cryptanalyst to access and provide opportunities to do the leak, distribute or modify the database records. One of the cryptographic algorithms used to secure data is using the DES algorithm to encrypt the data to be stored or sent. The DES algorithm belongs to a cryptographic system of symmetry and is a type of block cipher. DES operates on a 64-bit block size. DES describes 64 bits of plaintext to 64 bits of ciphertext using 56 bits of internal key (internal key) or up-key (subkey). The internal key is generated from an external key 64-bit length. This research describes the process of securing database records by encrypting it based on DES algorithm, resulting in text record databases in the form of passwords that are difficult to understand and understand by others. This is done in an attempt to minimize the misuse of database records.


Nowadays, data keeps increasing; this in turn makes big data one of the hot topics in the modern era of technology. The biggest challenge, however, is big data security and cryptography is one of the most secure techniques. In this proposed model, we use this technique to secure data via a proposed new stream cipher technique to process more than one block by dividing the total size of the block into two parts, and swapping them then, combine and apply XOR operation with key and make some of mathematical operation. This operation is of fifteen rounds which make it very difficult for attacks to guess the plaintext.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan ◽  
Robbi Rahim

The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.


Sign in / Sign up

Export Citation Format

Share Document