scholarly journals Pengamanan Data File Teks (Word) Menggunakan Algoritma RC4

2020 ◽  
Vol 1 (2) ◽  
pp. 114
Author(s):  
Dedy Ronald Saragi ◽  
Janter Manuel Gultom ◽  
Jose Andreas Tampubolon ◽  
Indra Gunawan

Data security on computers can provide a protection for our data. Cryptographic techniques are very important techniques in securing data. Cryptography is the science of encryption techniques where the "original text" (plaintext) is encrypted using an encryption key into "random text that is difficult to read" (ciphertext) by someone who does not have a decryption key, one of the modern cryptographic methods developed is the RC4 algorithm. RC4 algorithm (Ron’s Code / Rivest’s Cipher) is one algorithm that can be used to encrypt data so that the original data can only be read by someone who has the encryption key.

TEKNOKOM ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 1-6
Author(s):  
Indra Surya Permana ◽  
Taufik Hidayat ◽  
Rahutomo Mahardiko

The development of information technology has grown exponentially and various of data collections and its method has been obtained. In the era of big data, data has now become an asset that held important values, while in the implementation of data delivery, it clearly is not always safe. One of the method to secure data delivery is data encryption using Cryptography. Cryptography provides an encryption service to secure data delivery by transforming it to random values so that it can no longer be read. The goal in this study was to produce an application that could be used to encrypt data, using ElGamal's cryptography method and hash checking using the SHA256 algorithm. After encryption, to ensure the encrypted data is still the original data without any changes or manipulation by unauthorized 3rd party then done by checking the hash generated using SHA256 algorithm. The data used in this study was a sample of raw data from the ATPWTP survey (ability to pay and willing to pay) conducted by the BPS Cirebon (Central Statistics) in 2019 and the data was in the form of Excel and txt files. The encryption process resulted in a cipher larger than the plaintext and takes longer for the data encryption process than during the data cipher decryption process.


Author(s):  
Ery Safrianti ◽  
Fernanda Fitriansyah

Android phone is one of the most widely used telecommunications devices today. The exchange of various forms of information ranging from text, sound, images and video through this media is inseparable from the threat of criminal crime through digital data theft. Data security aspects are very important to be considered, one of which is data in the form of text. Text data is commonly used in short message services (SMS), chat in various Android applications or in the use of logins and passwords. This research will create an application on Android for securing text data through cryptographic techniques with a layered algorithm using three types of algorithms namely Caesar, Blowfish and AES Algorithms (Advanced Standard Encryption). This application can run on Android 5.0 (lollipop) or above, which can be used to encrypt and decrypt text messages. The test results show that the results of the initial text that was encoded through the encryption process can be safely returned by the decryption process without the slightest mistake with the original text.  The encryption test for capital letters, numbers, and punctuation can be completely decrypted.


Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


As the world is getting digitalized, the rush for need of secured data communication is overtop. Provoked by the vulnerability of human visual system to understand the progressive changes in the scenes, a new steganography method is proposed. The paper represents a double protection methodology for secured transmission of data. The original data is hidden inside a cover image using LSB substitution algorithm. The image obtained is inserted inside a frame of the video producing a stego-video. Stego-video attained is less vulnerable to attacks. After decryption phase, the original text is obtained which is error-free and the output image obtained is similar as the cover image. The quality of stego-video is high and there is no need for additional bandwidth for transmission. The hardware implement is required in order to calculate the corresponding analytical results. The proposed algorithm is examined and realized for various encryption standards using Raspberry Pi3 embedded hardware. The results obtained focuses on the attributes of the proposed model. On comparing with other conventional algorithms, the proposed scheme exhibits high performance in both encryption and decryption process with increase in efficiency of secured data communication.


2021 ◽  
Vol 5 (6) ◽  
pp. 1113-1119
Author(s):  
Muhammad Fadlan ◽  
Haryansyah ◽  
Rosmini

One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly used, namely substitution techniques and transposition techniques. One of the weaknesses of the basic cryptographic techniques is the lower level of data security. This study proposed a super encryption model in securing data by combining cryptographic algorithms with substitution techniques, i.e., autokey cipher and transposition, i.e., columnar transposition cipher. This study used the Avalanche Effect method as a measurement tool for the proposed super encryption model. The test results have shown that the proposed super encryption model can provide a better level of security. The avalanche effect test on the five data test shows that the average AE value of the proposed super encryption model is 30.76%. This value is higher than the single autokey cipher algorithm of 1.66% and column transposition with a value of 18.03%. Other results from the five data test have shown that the proposed model has a high level of accuracy of 100% in terms of the decryption process results, which is the same as the initial data before going through the encryption process.  


Author(s):  
Hicham Amellal ◽  
Abdelmajid Meslouhi ◽  
Abderahim El Allati ◽  
Annas El Haddadi

With the advancement of communication and information technology, the internet has become used as a platform for computing and not only a way of communications networks. Accordingly, the large spread of cloud computing led to the emergence of different privacy implications and data security complexities. In order to enhance data security in the cloud, the authors propose in this chapter the use of an encryption box, which includes different cryptosystems. In fact, this step gives the user the opportunities to encrypt data with an unknown algorithm and makes a private key before the storage of data in the host company servers. Moreover, to manage the encryption database, the authors propose a quantum approach in search based on Grover's algorithm.


Author(s):  
Jiankai Yu ◽  
Songyang Li ◽  
Kan Wang ◽  
Guanbo Wang ◽  
Ganglin Yu

The accuracy of the nuclear cross section data is a prerequisite for the accuracy of reactor physics calculations. The RXSP(Reactor Cross Section Processing Code) which is developed by REAL (Reactor Engineering Analysis Laboratory) of Department of Engineering Physics in Tsinghua University, has changed the situation in China that nuclear cross section processing has been dependent of NJOY for a long time. The key methods such as fast Doppler broadening, thermal libraries interpolation, and OpenMP parallel acceleration, can be achieved with RXSP. This code is able to process the original data of ENDF/B (Evaluated Nuclear Data File/B) efficiently and accurately to produce the continuous energy point cross section data which is necessary for RMC. By comparing with NJOY, The microscopic and macroscopic verification shows that RXSP has the same accuracy as NJOY while RXSP has saved greatly the processing time to meet the efficient demand in the frequent reactor physics-thermal-hydraulic coupling calculations to solve the complex questions related on a large number of materials and temperature. In addition, RXSP make it available to process the resonance parameters of the R-matrix Limited format.


2020 ◽  
Vol 4 (3) ◽  
pp. 1-10
Author(s):  
Naim BAFTIU

Cryptography is an old idea and science, but its approach exists and plays a large role in modernization today. Conventional cryptographic techniques form the basis of today's cryptographic algorithm. The different categories of algorithms have their respective features; internally, in performance and implementation. Cryptographic schemes and mechanisms have undergone continuous improvement. The application of cryptography has grown increasingly, ranging from limited use in state institutions to widespread use by private individuals and companies. The increased use of the Internet has significantly influenced the nature of applications and the way we communicate. Data security dictates the use of different cryptographic techniques. For this reason, we analyze in detail the various coding techniques by evaluating their performance and efficiency. Regarding the new paradigms in cryptography there are also new cryptographic schemes whose application requires detailed study and analysis. The classical cryptography algorithm is the oldest algorithm that was used long before the cryptographic system was discovered. Currently, the system has been widely applied to secure data, and using new methods in a way to improve existing methods. In this thesis the use of cryptographic methods using the C # programming language will be discussed.


Sign in / Sign up

Export Citation Format

Share Document