KRIPTOGRAFI HYBRIDA AGLORITMA HILL CIPHER DAN RSA SEBAGAI PENGEMBANGAN KRIPTOGRAFI KUNCI SIMETRIS (STUDI KASUS : NILAI MAHASISWA AMIK MBP)
Kata Kunci:
Kriptografi_Hybrida, HillCipher, RSA, Keamanan_Informasi.Abstrak
Risiko mengirim informasi melalui internet adalah tingkat keamanan yang rendah, sebab itu informasi harus dijaga supaya informasi tersebut dikirim dan diterima oleh orang yang berhak. Nilai mahasiswa yang dikirim ke Sistem Informasi Akademik AMIK MBP dapat di bajak oleh kriptanalis, sehingga perlu adanya metode untuk mengamankan nilai tersebut. Untuk meningkatkan keamanan informasi digunakan kriptografi. Penelitian ini bertujuan untuk menganalisis kinerja algoritma kriptografi terhadap peningkatan keamanan nilai sehingga nilai tidak dapat dibajak oleh kriptanalis. Algoritma yang digunakan adalah modifikasi algoritma hill cipher dengan menggunakan hybrid cryptosystem untuk menyembunyikan kunci. Kunci yang digunakan karakter ASCII yang diubah menjadi numerik kemudian disusun dengan matriks 3x3 yang memiliki determinan dan invertible. Penelitian ini menggunakan metode kuantitatif yang bersifat pengembangan dengan membangun sebuah sistem untuk melakukan uji coba dan analisis. Hasil penelitian menunjukkan dengan kriptografi hybrida pada kunci Hill dan algoritma RSA, pengiriman nilai lebih aman jika dibangdingkan dengan kriptografi menggunakan kunci hill cipher. Untuk mengetahui kunci hill harus mencoba 2569 kombinasi angka, dan untuk menebak kunci hill setelah di hybrid dengan Rivest Shamir Adleman (RSA) 12 bit mencapai 2569 x 1036 kemungkinan, RSA 16 bit mencapai 2569x1045 kemungkinan, RSA 32 bit mencapai 2569x1081 kemungkinan. Jumlah karakter setelah di enkripsi dan di dekripsi tetap sama karena penggunaan modulo 256.
Referensi
Wowor, “Modifikasi Kriptografi Hill Cipher Menggunakan Convert Between Base” Open Acsess Journal of Information System (OAJIS), 2013.
Shahram, K. and Siavash, A., Ciphertext-only attack on d×d Hill in O(d13d), Information Processing Letters 118, 2016, pp. 25–29. (online) http://www.elsevier.com/locate/ipl.
Mahajan, S. and Singh, M., Performance Analysis of Efficient RSA Text Encryption Using NVIDIA CUDA-C and OpenCL. Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing - ICONIAAC '14 ISBN: 978-1-4503-2908-8, 2014, pp.1-6.
Meng, X. and Zheng, X., Cryptanalysis Of RSA With A Small Parameter Revisited. Information Processing Letters 115: 858–862, 2015.
Chmielowiec, A., Fixed Points Of The RSA Encryption Algorithm. Elsevier Theoretical Computer Science 411, 2010, pp.288-292.
Thao, J., RSA Visual: A Visualization Tool for the RSA Cipher, Proceedings of the ACM National Science Foundation under grants DUE-1140512, DUE-1245310 and IIS-1319363. Department of Computer Science Michigan Technological University Houghton, MI. USA. 2014.
Iyer, S.C., Sedamkar, R.R., Gupta, S., A Novel Idea on Multimedia Encryption using Hybrid Crypto Approach. 7th International Conference on Communication, Computing and Virtualization, 2016, pp. 293-298.
Konheim, A.G., Computer Security and Cryptography. Wiley-Interscience, A John Wiley and Sons Inc, 2007.
Hoffstein,J., Pipher,J. and Silverman.J.H., An Introduction Of Mathematical Cryptography. Springer Science + Business Media .e-ISBN: 978-0-387-77994-2, 2008.
Paar, J., Pelzl, J., Preenel, B. ( Editors), Understanding Cryptography. Springer : New York, 2010.
Tyagi, N. et al, Hybrid Key Cryptography: A Tool for Security. International Journal of Innovative Research in Science, Engineering and Technology, Vol. 6, Issue 3, 2017. ISSN: 2347-6710.
Gupta,R.K. and Singh, P., A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network. International Journal of Emerging Technology and Advanced Engineering ISSN 2250-2459, 2013.
Schneier, B., Applied Cryptography 2nd edition, Protocols,Algorithms,and Source Code in C. ISBN-13: 978-1-119-09672-6, Amazon,1996.
Munir, R., Kriptografi. Informatika, Bandung. 2006.
Dooley, J.F., A Brief History of Cryptology and Cryptographic Algorithms. Springer Brief in Computer Science. ISBN 978-3-319-01628-3, 2013.
Palanisamy, V. & Jeneba, M. A., Hybrid Cryptography By The Implementation Of RSA And AES, International Journal of Current Research Vol. 33, Issue, 4, 2011, pp.241-244. ISSN: 0975-833X.
Seth, S. M. and Mishra R., Comparative Analysis of Encryption Algorithms for Data Communication, International Journal of Computer Science and Technology, Vol. 2, 2011, ISSN : 2229-4333.
Toorani, M. and Falahati, A., A Secure Variant of the Hill Cipher, Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC'09). DOI 10.1109/ISCC.2009.5202241, 2009.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Authors who publish with this journal agree to the following terms:
- Copyright on any article is retained by the author(s).
- Author grant the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
- The article and any associated published material is distributed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License