ADOPSI REPETITIF COVERTEXT PADA MEODEL ENKRIPSI PDAC

  • Hari Murti
  • Edy Supriyanto
  • Rara Redjeki
  • Eka Ardhianto Universitas Stikubank
Keywords: covertext, PDAC, Enkripsi, Kunci

Abstract

Teknik kriptografi dan steganografi berperan penting dalam pengamanan informasi. Gabungan keduanya memberikan tingkat keamanan informasi yang lebih kuat dan sulit dipecahkan. Model enkripsi Parallel Encryption with Digit Arithmetic of Covertext (PDAC) mengadopsi kriptografi dan steganografi dalam pengamanan pesan. Penggunaan PDAC sebagai algoritma enkripsi memerlukan kesesuaian pada proses pemilihan coverteksnya. Ketepatan jumlah covertext dalam PDAC mempengaruhi berjalan atau tidaknya PDAC dalam mengenkripsi pesan. Jika jumlah pesan sangat panjang maka akan menjadi sulit bagi pengguna dalam menentukan coverteksnya dan jika jumlah covertext PDAC tidak sesuai, maka proses enkripsi akan menjadi tidak sempurna. Penelitian ini melakukan pengubahan model yang bertujuan menutup celah PDAC. Modifikasi model yang diusulkan mengadopsi penggunaan covertext yang diterapkan secara berulang. Perulangan covertext yang diterapkan dalam PDAC mampu memproses pengamanan informasi secara menyeluruh. Keuntungan lain yang diperoleh ialah modifikasi ini memudahkan pengguna untuk menggunakan PDAC tanpa harus memenuhi kebutuhan minimum covertextnya

Downloads

Download data is not yet available.

References

Ardhianto, E., Handoko, W. T., Murti, H., & Redjeki, R. S. A. (2021). Encryption with Covertext and Reordering using Permutated Table and Random Function. 2021 2nd International Conference on Innovative and Creative Information Technology, ICITech 2021. https://doi.org/10.1109/ICITech50181.2021.9590171
Ardhianto, E., Trisetyarso, A., Suparta, W., Abbas, B. S., & Kang, C. H. (2020a). Design Securing Online Payment Transactions Using Stegblock through Network Layers. IOP Conference Series: Materials Science and Engineering, 879(1). https://doi.org/10.1088/1757-899X/879/1/012027
Ardhianto, E., Trisetyarso, A., Suparta, W., Abbas, B. S., & Kang, C. H. (2020b). Design Securing Online Payment Transactions Using Stegblock through Network Layers. IOP Conference Series: Materials Science and Engineering, 879(1). https://doi.org/10.1088/1757-899X/879/1/012027
Gaur, M., & Sharma, M. (2015). A New PDAC (Parallel Encryption with Digit Arithmetic of Cover Text) Based Text Steganography Approach for Cloud Data Security. International Journal on Recent and Innovation Trends in Computing and Communication , 3(3), 1344–1352. http://www.ijritcc.org
Handoko, W. T., Ardhianto, E., Hadiono, K., & Sutanto, F. A. (2020). Protecting Data by Socket Programming Steganography. IOP Conference Series: Materials Science and Engineering, 879(1). https://doi.org/10.1088/1757-899X/879/1/012028
Handoko, W. T., Ardhianto, E., & Supriyanto, E. (2020). MODIFIKASI NEW PDAC (PARALLEL ENCRYPTION WITH DIGIT ARITHMETIC OF COVER TEXT). SENDIU 2020, 55–59.
Kataria, S., Kumar, T., Singh, K., & Nehra, M. S. (2013). ECR (encryption with cover text and reordering) based text steganography. 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013), 612–616. https://doi.org/10.1109/ICIIP.2013.6707666
Kataria, S., Singh, B., Kumar, T., & Shekhawat, H. S. (2013). PDAC (Parallel Encryption with Digit Arithmetic of Cover Text) Based Text Steganography. Proc. of Int. Conf. on Advances in Computer Science, AETACS.
N, M. K., Jayaramu, H. S., Kurian, M. Z., & Shiva kumar, K. B. (2007). FPGA Implementation of Vigenere Cipher Method Based on Colour Image Steganography. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (An ISO, 3(4), 9051–9057. www.ijareeie.com
Nahar, K., & Chakraborty, P. (2020). A Modified Version of Vigenere Cipher using 95×95 Table. International Journal of Engineering & Advanced Technology (IJEAT), 9(5), 1144–1148. https://doi.org/10.35940/ijeat.E9941.069520
Nofiyanto, N., Hamzah, hamzah, & Surbakti, H. (2014). SHORT MESSAGE ENCRYPTION APPLICATION DEVELOPMENT USING VIGENERE ALGORITHM UTILIZING EULER’S NUMBER ON ANDROID SMARTPHONE. Jurnal Teknologi Informasi , 9(27), 81–92.
Qowi, Z., & Hudallah, N. (2021). Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm. Journal of Physics: Conference Series, 1918(4), 1–6. https://doi.org/10.1088/1742-6596/1918/4/042009
Sadkhan, S. B., & Salman, A. O. (2018). Fuzzy Logic for Performance Analysis of AES and Lightweight AES. 2018 International Conference on Advanced Science and Engineering (ICOASE), 318–323. https://doi.org/10.1109/ICOASE.2018.8548832
Telaumbanua, F., & Zebua, T. (2020). Modifikasi Vigenere Cipher Dengan Pembangkit Kunci Blum Blum Shub. KOMIK (Konferensi Nasional Teknologi Informasi Dan Komputer), 4(1). https://doi.org/10.30865/komik.v4i1.2646
How to Cite
Murti, H., Supriyanto, E., Redjeki, R., & Ardhianto, E. (2022). ADOPSI REPETITIF COVERTEXT PADA MEODEL ENKRIPSI PDAC. Jurnal Informatika Polinema, 9(1), 1-8. https://doi.org/10.33795/jip.v9i1.1152