Securitary Text on Images with RC-128 Bit Synthric Key Encryption

Authors

  • Muslih Muslih Dian Nuswantoro University
  • Abdussalam Abdussalam Dian Nuswantoro University
  • Elkaf Rahmawan Pramudya Dian Nuswantoro University

DOI:

https://doi.org/10.33633/jais.v6i2.4620

Abstract

The main purpose of using cryptography is to provide the following four basic information security services. One of the purposes of cryptography is secrecy. Confidentiality is the fundamental security service provided by cryptography. This is a security service that stores information from unauthorized persons. Confidentiality can be achieved through a variety of ways ranging from physical security to the use of mathematical algorithms for data encryption. Vernam cipher is a stream cipher where the original data or plain with 8x8 block operation. Experimental results prove that RC4 can perform encryption and decryption with a fast execution process. In this study used a processor with 8GB of RAM. The encryption result of the text used yields the average encryption time and decryption average of 2 second.

References

K. R. Ilaga and C. A. Sari, “Analysis of Secure Image Crypto-Stegano Based on Electronic Code Book and Least Significant Bit,” J. Appl. Intell. Syst., vol. 3, no. 1, pp. 28–38, 2018.

E. H. Rachmawanto and C. A. Sari, “Keamanan File Menggunakan Teknik Kriptografi Shift Cipher,” Techno.COM, vol. 14, no. 4, pp. 329–335, 2015.

K. Ganeshkumar and D. Arivazhagan, “Generating a digital signature based on new cryptographic scheme for user authentication and security,” Indian J. Sci. Technol., vol. 7, no. Specialissue6, pp. 1–5, 2014.

V. Kumar and P. K. Koul, “Robust RSA for Digital Signature,” IJCSI Int. J. Comput. Sci. Issues, vol. 8, no. 6, pp. 359–362, 2011.

P. Saha, “A comprehensive study on digital signature for internet security,” Accent. Trans. Inf. Secur., vol. 1, no. 1, pp. 1–6, 2016.

C. J. Mitchell, “On the Security of 2-Key Triple DES,” IEEE Trans. Inf. Theory, vol. 62, no. 11, pp. 6260–6267, Nov. 2016.

M. B. Pramanik, “Implementation of Cryptography Technique using Columnar Transposition,” pp. 19–23, 2014.

K. Senthil, K. Prasanthi, and R. Rajaram, “A modern avatar of Julius Ceasar and Vigenere cipher,” in 2013 IEEE International Conference on Computational Intelligence and Computing Research, 2013, pp. 1–3.

E. Rachmawanto, C. Sari, Y. Astuti, and L. Umaroh, “KRIPTOGRAFI VERNAM CIPHER UNTUK MENCEGAH PENCURIAN DATA PADA SEMUA EKSTENSI FILE,” in PROSIDING SEMINAR NASIONAL MULTI DISIPLIN ILMU & CALL FOR PAPERS UNISBANK (SENDI_U) KE-2 Tahun 2016, 2016, pp. 46–51.

M. Jain and S. K. Lenka, “Secret data transmission using vital image steganography over transposition cipher,” in 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, pp. 1026–1029.

A. Saraswat, C. Khatri, Sudhakar, P. Thakral, and P. Biswas, “An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication,” Procedia Comput. Sci., vol. 92, pp. 355–360, 2016.

O. Tornea, M. E. Borda, V. Pileczki, and R. Malutan, “DNA Vernam Cipher,” Proc. 3rd Int. Conf. E-Health Bioeng. - EHB 2011, pp. 24–27, 2011.

R. Mathur, S. Agarwal, and V. Sharma, “Solving security issues in mobile computing using cryptography techniques — A Survey,” in International Conference on Computing, Communication & Automation, 2015, pp. 492–497.

P. C. Mandal, “Superiority of Blowfish Algorithm,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 2, no. 9, pp. 196–201, 2012.

D. P. Joseph and M. Krishna, “Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 6, no. 3, pp. 51–56, 2015.

Sangeeta and E. A. Kaur, “A Review on Symmetric Key Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 4, pp. 358–362, 2017.

V. Rekhate, “Secure and Efficient Message Passing in Distributed Systems using One-Time Pad,” in 2016 International Conference on Computing, Analytics and Security Trends (CAST) College of Engineering Pune, India. Dec 19-21, 2016 Secure, 2016, pp. 393–397.

R. Shukla, H. O. Prakash, R. P. Bhushan, S. Venkataraman, and G. Varadan, “Sampurna Suraksha: Unconditionally Secure and Authenticated One Time Pad Cryptosystem,” in 2013 International Conference on Machine Intelligence and Research Advancement, 2013, pp. 174–178.

A. D. Irfianti, “METODE PENGAMANAN ENSKRIPSI RC4 STREAM CIPHER UNTUK APLIKASI,” Semin. Nas. Apl. Teknol. Inf. 2007 (SNATI 2007), vol. 2007, no. Snati, p. 4, 2007.

A. Mousa and A. Hamad, “Evaluation of the RC4 Algorithm for Data Encryption,” Int. J. Comput. Sci. Appl., vol. 3, no. 1, pp. 44–56, 2006.

N. Sinha, M. Chawda, and K. Bhamidipati, “Enhancing Security of Improved RC4 Stream Cipher by Converting into Product Cipher,” Int. J. Comput. Appl., vol. 94, no. 18, pp. 17–21, May 2014.

I. Sumartono, A. P. U. Siahaan, and N. Mayasari, “An Overview of the RC4 Algorithm,” IOSR J. Comput. Eng., vol. 18, no. 6, pp. 67–73, 2016.

R. Tiwari and A. Sinhal, “Block based text data partition with RC4 encryption for text data security,” Int. J. Adv. Comput. Res., vol. 6, no. 24, pp. 107–113, May 2016.

Downloads

Published

2021-12-06