A File Encoding Using A Combination of Advanced Encryption Standard, Cipher Block Chaining and Stream Cipher In Telkom Region 4 Semarang

Authors

  • Lekso Budi Handoko Universitas Dian Nuswantoro
  • Andi Danang Krismawan Universitas Dian Nuswantoro

DOI:

https://doi.org/10.33633/jais.v6i2.4502

Abstract

The increase in significant advances in information technology greatly provides comfort and convenience in managing data. This convenience is what makes people who are not responsible for using it as a crime such as hacking, cracking, phishing, and so on. In Telkom Region 4 Semarang, there is a container where there are important company data such as customer data. Customer data is very important and the contents of the data must be kept confidential. The company has experienced significant losses due to information leakage due to negligence in the last 5 years. For this reason, data security is necessary so that data is safe and is not misused. This study applies the Advance Encryption Standard algorithm - Cipher Block Chaining (AES-CBC) and Stream cipher in order to secure data so as to reduce the risk of data theft by telecom subscribers. Based on the average avalanche effect value of AES-CBC and a stream cipher of 49.34%, this shows that the AES-CBC and Stream Cipher encrypted files are difficult to crack so that data confidentiality is well maintained.

References

D. P. Joseph and M. Krishna, “Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 6, no. 3, pp. 51–56, 2015.

Sangeeta and E. A. Kaur, “A Review on Symmetric Key Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 4, pp. 358–362, 2017.

M. A. Alomari, K. Samsudin, and A. R. Ramli, “A study on encryption algorithms and modes for disk encryption,” 2009 Int. Conf. Signal Process. Syst. ICSPS 2009, pp. 793–797, 2009.

S. Singh, V. S. Rathore, R. Singh, and M. K. Singh, “Hybrid semi-blind image watermarking in redundant wavelet domain,” Multimed. Tools Appl., vol. 76, no. 18, pp. 19113–19137, Sep. 2017.

S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017.

R. D. O. Purnama and H. Lestiawan, “ALGORITMA KRIPTOGRAFI MODE OPERASI CIPHER BLOCK CHAINING ( CBC ) DAN STEGANOGRAFI METODE END OF FILE ( EOF ),” Techno.COM, pp. 1–11.

K. R. Ilaga and C. A. Sari, “Analysis of Secure Image Crypto-Stegano Based on Electronic Code Book and Least Significant Bit,” J. Appl. Intell. Syst., vol. 3, no. 1, pp. 28–38, 2018.

S. Garg, S. Khera, and A. Aggarwal, “Extended Vigenere Cipher with Stream Cipher,” Int. J. Eng. Sci. Comput., vol. 6, no. 5, pp. 5176–5180, 2016.

A. Kulsoom, D. Xiao, Aqeel-ur-Rehman, and S. A. Abbas, “An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules,” Multimed. Tools Appl., vol. 75, no. 1, pp. 1–23, 2016.

R. Naoum, A. Shihab, and S. Alhamouz, “Enhanced Image Steganography System based on Discrete Wavelet Transformation and Resilient Back-Propagation,” Int. J. Comput. Sci. Netw. Secur., vol. 16, no. 1, pp. 114–122, 2016.

A. Kumar and N. Tiwari, “Effective Implementation and Avalanche Effect of AES,” Int. J. Secur. Priv. Trust Manag., vol. 1, no. 3, pp. 31–35, 2012.

P. Witoolkollachit, “The avalanche effect of various hash functions between encrypted raw images versus non-encrypted images : A comparison study,” J. Thai Med. Informatics Assoc., vol. 1, pp. 69–82, 2016.

Downloads

Published

2021-12-06