Securitary Text on Images with RC-128 Bit Synthric Key Encryption
DOI:
https://doi.org/10.33633/jais.v6i2.4620Abstract
The main purpose of using cryptography is to provide the following four basic information security services. One of the purposes of cryptography is secrecy. Confidentiality is the fundamental security service provided by cryptography. This is a security service that stores information from unauthorized persons. Confidentiality can be achieved through a variety of ways ranging from physical security to the use of mathematical algorithms for data encryption. Vernam cipher is a stream cipher where the original data or plain with 8x8 block operation. Experimental results prove that RC4 can perform encryption and decryption with a fast execution process. In this study used a processor with 8GB of RAM. The encryption result of the text used yields the average encryption time and decryption average of 2 second.References
K. R. Ilaga and C. A. Sari, “Analysis of Secure Image Crypto-Stegano Based on Electronic Code Book and Least Significant Bit,” J. Appl. Intell. Syst., vol. 3, no. 1, pp. 28–38, 2018.
E. H. Rachmawanto and C. A. Sari, “Keamanan File Menggunakan Teknik Kriptografi Shift Cipher,” Techno.COM, vol. 14, no. 4, pp. 329–335, 2015.
K. Ganeshkumar and D. Arivazhagan, “Generating a digital signature based on new cryptographic scheme for user authentication and security,” Indian J. Sci. Technol., vol. 7, no. Specialissue6, pp. 1–5, 2014.
V. Kumar and P. K. Koul, “Robust RSA for Digital Signature,” IJCSI Int. J. Comput. Sci. Issues, vol. 8, no. 6, pp. 359–362, 2011.
P. Saha, “A comprehensive study on digital signature for internet security,” Accent. Trans. Inf. Secur., vol. 1, no. 1, pp. 1–6, 2016.
C. J. Mitchell, “On the Security of 2-Key Triple DES,” IEEE Trans. Inf. Theory, vol. 62, no. 11, pp. 6260–6267, Nov. 2016.
M. B. Pramanik, “Implementation of Cryptography Technique using Columnar Transposition,” pp. 19–23, 2014.
K. Senthil, K. Prasanthi, and R. Rajaram, “A modern avatar of Julius Ceasar and Vigenere cipher,” in 2013 IEEE International Conference on Computational Intelligence and Computing Research, 2013, pp. 1–3.
E. Rachmawanto, C. Sari, Y. Astuti, and L. Umaroh, “KRIPTOGRAFI VERNAM CIPHER UNTUK MENCEGAH PENCURIAN DATA PADA SEMUA EKSTENSI FILE,” in PROSIDING SEMINAR NASIONAL MULTI DISIPLIN ILMU & CALL FOR PAPERS UNISBANK (SENDI_U) KE-2 Tahun 2016, 2016, pp. 46–51.
M. Jain and S. K. Lenka, “Secret data transmission using vital image steganography over transposition cipher,” in 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, pp. 1026–1029.
A. Saraswat, C. Khatri, Sudhakar, P. Thakral, and P. Biswas, “An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication,” Procedia Comput. Sci., vol. 92, pp. 355–360, 2016.
O. Tornea, M. E. Borda, V. Pileczki, and R. Malutan, “DNA Vernam Cipher,” Proc. 3rd Int. Conf. E-Health Bioeng. - EHB 2011, pp. 24–27, 2011.
R. Mathur, S. Agarwal, and V. Sharma, “Solving security issues in mobile computing using cryptography techniques — A Survey,” in International Conference on Computing, Communication & Automation, 2015, pp. 492–497.
P. C. Mandal, “Superiority of Blowfish Algorithm,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 2, no. 9, pp. 196–201, 2012.
D. P. Joseph and M. Krishna, “Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 6, no. 3, pp. 51–56, 2015.
Sangeeta and E. A. Kaur, “A Review on Symmetric Key Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 4, pp. 358–362, 2017.
V. Rekhate, “Secure and Efficient Message Passing in Distributed Systems using One-Time Pad,” in 2016 International Conference on Computing, Analytics and Security Trends (CAST) College of Engineering Pune, India. Dec 19-21, 2016 Secure, 2016, pp. 393–397.
R. Shukla, H. O. Prakash, R. P. Bhushan, S. Venkataraman, and G. Varadan, “Sampurna Suraksha: Unconditionally Secure and Authenticated One Time Pad Cryptosystem,” in 2013 International Conference on Machine Intelligence and Research Advancement, 2013, pp. 174–178.
A. D. Irfianti, “METODE PENGAMANAN ENSKRIPSI RC4 STREAM CIPHER UNTUK APLIKASI,” Semin. Nas. Apl. Teknol. Inf. 2007 (SNATI 2007), vol. 2007, no. Snati, p. 4, 2007.
A. Mousa and A. Hamad, “Evaluation of the RC4 Algorithm for Data Encryption,” Int. J. Comput. Sci. Appl., vol. 3, no. 1, pp. 44–56, 2006.
N. Sinha, M. Chawda, and K. Bhamidipati, “Enhancing Security of Improved RC4 Stream Cipher by Converting into Product Cipher,” Int. J. Comput. Appl., vol. 94, no. 18, pp. 17–21, May 2014.
I. Sumartono, A. P. U. Siahaan, and N. Mayasari, “An Overview of the RC4 Algorithm,” IOSR J. Comput. Eng., vol. 18, no. 6, pp. 67–73, 2016.
R. Tiwari and A. Sinhal, “Block based text data partition with RC4 encryption for text data security,” Int. J. Adv. Comput. Res., vol. 6, no. 24, pp. 107–113, May 2016.
Downloads
Published
Issue
Section
License
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).