Penerapan Kriptografi Algoritma Blowfish pada Pengamanan Pesan Data Teks
DOI:
https://doi.org/10.33633/tc.v16i4.1452Abstract
Kriptografi dibutuhkan untuk pengamanan data dalam jaringan komunikasi. Artikel ini membahas implementasi algoritma Blowfish menggunakan Microsoft Visual Basic. Permasalahan pada tulisan ini bagaimana penerapan algoritma blowfish pada pengamanan dayta teks dan bagaiaman performa algoritma dalam mengkesekusi proses enkripsi maupun deksripsi. Metode yang digunakan yaitu menggunakan SDLC dengan membangun perangkat lunak menggunakan Visual Basic. Algoritma kriptografi yang digunakan yaitu Blowfish. Data uji menggunakan beberapa file dengan ukuran berbeda mulai dari 64Kb, 128Kb, 256Kb, 512Kb, dan 1024Kb. Berdasar hasil implementasi algoritma Blowfish menggunakan MS Visual data berhasil dienkripsi maupun didekripsi dan dapat kembali seperti semula, sehingga dapat digunakan untuk melakukan pengamanan data. Hasil pengujian waktu eksekusi menunjukkan proses enkripsi membutuhkan waktu yang lebih lama daripada proses dekripsi. Data yang diperoleh menunjukkan proses deksripsi 33% lebih cepat daripada proses enkripsi.References
Adeyinka, O., 2008, Internet Attack Methods and Internet Security Technology, Second Asia International Conference on Modelling and Simulation, pp.77â€82, 13â€15 May 2008.
Kautzar, M.G., 2007, Studi Kriptografi Mengenai Triple DES dan AES, ITB, Bandung.
Schneier, B., 1996, Applied Cryptography 2nd Edition, Wiley & Sons. Inc., New York.
Savitri, Dian Intania. 2006. Analisis Keamanan Algoritma Kriptografi DES, Double DES, dan Triple DES. Bandung: ITB.
J. Massey. An introduction to contemporary cryptology. IEEE proceedings, 76(5), 533--549, 1988.
Data Encryption Standard, Federal Information Processing Standard (FIPS) Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington, DC (January 1977).
Text Book: Cryptography and network security, Principles and practices by William Stalling, Retrieved on 8 December 2006.
Bruce Schneier, "The Blowfish encryption algorithm9", Dr. Dobb's Journal of Software Tools, 19(4), p. 38, 40, 98, 99, April 1994.
Heys, H.M.; Tavares, E. On the Security of the CAST Encryption Algorithm, Electrical & Computer Engg.
X. Lai and J. Massey. A proposal for a new block encryption standard. In Proceedings of the EUROCRYPT 90 Conference, pp. 3 89-404, 1990.
Wheeler, D.J., & Needham, R.J. (1994). TEA, a tiny encryption algorithm. In Fast Software Encryption – Proceedings of the 2nd International Workshop,1008.
J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES algorithm submission, September 3, 1999.
James Nechvatal, Elaine Barker, Lawrence Bassham, William Burr, Morris Dworkin, James Foti, and Edward Roback, Report on the Development of the Advanced Encryption Standard (AES), Volume 106 Number 3 May– June 2001.
Schneier, Bruce, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson;. 1998 "Twofish : A 128-bit block chiper".
Suriski Sitinjak, Yuli Fauziah, and Juwairiah, "Aplikasi Kriptografi File Menggunakan Algoritma Blowfish," in Seminar Nasional Informatika 2010 (semnasIF 2010), Yogyakarta, 2010, pp. C-85.
Muslim, M. A., & Prasetiyo, B. (2016). Implementation Twofish Algorithm for Data Security in a Communication Network using Library Chilkat Encryption Activex. Journal of Theoretical and Applied Information Technology, 84(3), 370.
Alamsyah, Muslim, M. A., & Prasetiyo, B. (2015). Data Hiding Security using Bit Matching-Based Steganography and Cryptography Without Change The Stego Image Quality. Journal of Theoretical and Applied Information Technology, 82(1), 106.
Menezes A.J., Oorschot, P.C., dan Vanstone, S.A., 1996, Handbook of Applied Cryptography, CRC Press, Boca Raton, New York.
Munir, R., 2006, Pengantar Kriptografi, ITB, Bandung.
Bruce Schneier, “Applied Cryptographyâ€, John Wiley & Sons, Inc. 1996.
Firdaus, Microsof Visual Basic 6.0 Untuk orang awam, Maxikom Palembang, April 2006.
Pressman, R.S., 2001, Software Engineering: A Practitioner's Approach, 6th Edition, The McGraw-Hill Companies, Inc, Singapore.
Arief, A., & Saputra, R. (2016). Implementasi Kriptografi Kunci Publik dengan Algoritma RSA-CRT pada Aplikasi Instant Messaging. Scientific Journal of Informatics, 3(1), 46-54.
Prasetiyo, B., Gernowo, R., & Noranita, B. (2015). Kombinasi Steganografi Berbasis Bit Matching dan Kriptografi DES untuk Pengamanan Data. Scientific Journal of Informatics, 1(1), 79-93.
Downloads
Published
Issue
Section
License
Copyright (c) 2017 Budi Prasetiyo, Much Aziz Muslim, Hendi Susanto

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
License Terms
All articles published in Techno.COM Journal are licensed under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0). This means:
1. Attribution
Readers and users are free to:
-
Share – Copy and redistribute the material in any medium or format.
-
Adapt – Remix, transform, and build upon the material.
As long as proper credit is given to the original work by citing the author(s) and the journal.
2. Non-Commercial Use
-
The material cannot be used for commercial purposes.
-
Commercial use includes selling the content, using it in commercial advertising, or integrating it into products/services for profit.
3. Rights of Authors
-
Authors retain copyright and grant Techno.COM Journal the right to publish the article.
-
Authors can distribute their work (e.g., in institutional repositories or personal websites) with proper acknowledgment of the journal.
4. No Additional Restrictions
-
The journal cannot apply legal terms or technological measures that restrict others from using the material in ways allowed by the license.
5. Disclaimer
-
The journal is not responsible for how the published content is used by third parties.
-
The opinions expressed in the articles are solely those of the authors.
For more details, visit the Creative Commons License Page:
? https://creativecommons.org/licenses/by-nc/4.0/