A File Encoding Using A Combination of Advanced Encryption Standard, Cipher Block Chaining and Stream Cipher In Telkom Region 4 Semarang
DOI:
https://doi.org/10.33633/jais.v6i2.4502Abstract
The increase in significant advances in information technology greatly provides comfort and convenience in managing data. This convenience is what makes people who are not responsible for using it as a crime such as hacking, cracking, phishing, and so on. In Telkom Region 4 Semarang, there is a container where there are important company data such as customer data. Customer data is very important and the contents of the data must be kept confidential. The company has experienced significant losses due to information leakage due to negligence in the last 5 years. For this reason, data security is necessary so that data is safe and is not misused. This study applies the Advance Encryption Standard algorithm - Cipher Block Chaining (AES-CBC) and Stream cipher in order to secure data so as to reduce the risk of data theft by telecom subscribers. Based on the average avalanche effect value of AES-CBC and a stream cipher of 49.34%, this shows that the AES-CBC and Stream Cipher encrypted files are difficult to crack so that data confidentiality is well maintained.References
D. P. Joseph and M. Krishna, “Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 6, no. 3, pp. 51–56, 2015.
Sangeeta and E. A. Kaur, “A Review on Symmetric Key Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 4, pp. 358–362, 2017.
M. A. Alomari, K. Samsudin, and A. R. Ramli, “A study on encryption algorithms and modes for disk encryption,” 2009 Int. Conf. Signal Process. Syst. ICSPS 2009, pp. 793–797, 2009.
S. Singh, V. S. Rathore, R. Singh, and M. K. Singh, “Hybrid semi-blind image watermarking in redundant wavelet domain,” Multimed. Tools Appl., vol. 76, no. 18, pp. 19113–19137, Sep. 2017.
S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017.
R. D. O. Purnama and H. Lestiawan, “ALGORITMA KRIPTOGRAFI MODE OPERASI CIPHER BLOCK CHAINING ( CBC ) DAN STEGANOGRAFI METODE END OF FILE ( EOF ),” Techno.COM, pp. 1–11.
K. R. Ilaga and C. A. Sari, “Analysis of Secure Image Crypto-Stegano Based on Electronic Code Book and Least Significant Bit,” J. Appl. Intell. Syst., vol. 3, no. 1, pp. 28–38, 2018.
S. Garg, S. Khera, and A. Aggarwal, “Extended Vigenere Cipher with Stream Cipher,” Int. J. Eng. Sci. Comput., vol. 6, no. 5, pp. 5176–5180, 2016.
A. Kulsoom, D. Xiao, Aqeel-ur-Rehman, and S. A. Abbas, “An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules,” Multimed. Tools Appl., vol. 75, no. 1, pp. 1–23, 2016.
R. Naoum, A. Shihab, and S. Alhamouz, “Enhanced Image Steganography System based on Discrete Wavelet Transformation and Resilient Back-Propagation,” Int. J. Comput. Sci. Netw. Secur., vol. 16, no. 1, pp. 114–122, 2016.
A. Kumar and N. Tiwari, “Effective Implementation and Avalanche Effect of AES,” Int. J. Secur. Priv. Trust Manag., vol. 1, no. 3, pp. 31–35, 2012.
P. Witoolkollachit, “The avalanche effect of various hash functions between encrypted raw images versus non-encrypted images : A comparison study,” J. Thai Med. Informatics Assoc., vol. 1, pp. 69–82, 2016.
Downloads
Published
Issue
Section
License
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).