An application data security with lempel-ziv welch and blowfish
Keywords:Encryption, Data Security, Application Security, Blowfish, LZW.
This research uses Blowfish algorithm which is part of Algorithm Encryption in cryptography. The Blowfish algorithm is part of symmetric cryptography, which is the key used for encryption equal to the key used for decryption. Besides the security of the file, the size problem of a file is also a calculation. Large files can be compressed by performing the LZW compression process is one of the compression algorithms that use dictionary. The merger between the cryptographic algorithm and the compression algorithm ensures that files cannot be viewed by unauthorized users, ensuring files can be stored in low-capacity media all of which lead to faster delivery.
 S. Renu and S. H. Krishna Veni, â€œAn enhanced security tree to secure cloud data,â€ Int. J. Eng. Technol., vol. 7, no. 1.1, pp. 64â€“70, 2018.
 K. Neeraja, P. Rama Chandra Rao, D. Suman Maloji, and D. Mohammed Ali Hussain, â€œImplementation of security system for bank using open CV and RFID,â€ Int. J. Eng. Technol., vol. 7, no. 2â€“7, p. 187, Mar. 2018.
 R. Rahim, â€œMan-in-the-middle-attack prevention using interlock protocol method,â€ ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp. 6483â€“6487, 2017.
 H. Nurdiyanto, R. Rahim, and N. Wulan, â€œSymmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement,â€ J. Phys. Conf. Ser., vol. 930, no. 1, p. 012005, Dec. 2017.
 D. Nofriansyah et al., â€œA New Image Encryption Technique Combining Hill Cipher Method , Morse Code and Least Significant Bit Algorithm,â€ J. Phys. Conf. Ser., vol. 954, no. 1, p. 012003, 2018.
 R. Rahim et al., â€œCombination Base64 Algorithm and EOF Technique for Steganography,â€ J. Phys. Conf. Ser., vol. 1007, no. 1, p. 012003, Apr. 2018.
 S. Marrapu, S. Sanakkayala, A. kumar Vempalli, and S. K. Jayavarapu, â€œSmart home based security system for door access control using smart phone,â€ Int. J. Eng. Technol., vol. 7, no. 1, p. 249, Mar. 2018.
 R. von Solms and J. van Niekerk, â€œFrom information security to cyber security,â€ Comput. Secur, vol. 38, no. October 2013, pp. 97â€“102, 2013.
 D. Coppersmith, J. Stern, and S. Vaudenay, â€œThe security of the birational permutation signature schemes,â€ J. Cryptol., vol. 10, no. 3, pp. 207â€“221, 1997.
 R. Rahim et al., â€œSearching Process with Raita Algorithm and its Application,â€ J. Phys. Conf. Ser., vol. 1007, no. 1, p. 012004, Apr. 2018.
 D. Abdullah et al., â€œA Slack-Based Measures for Improving the Efficiency Performance of Departments in Universitas Malikussaleh,â€ Int. J. Eng. Technol., vol. 7, no. 2, pp. 491â€“494, Apr. 2018.
 H. Hartono, D. Abdullah, and A. S. Ahmar, â€œA New Diversity Technique for Imbalance Learning Ensembles,â€ Int. J. Eng. Technol., vol. 7, no. 2, pp. 478â€“483, Apr. 2018.
 R. Rahim, M. Dahria, M. Syahril, and B. Anwar, â€œCombination of the Blowfish and Lempel-Ziv-Welch algorithms for text compression,â€ World Trans. Eng. Technol. Educ., vol. 15, no. 3, pp. 292â€“297, 2017.
 H. Nurdiyanto and R. Rahim, â€œEnhanced pixel value differencing steganography with government standard algorithm,â€ in 2017 3rd International Conference on Science in Information Technology (ICSITech), 2017, pp. 366â€“371.
 E. Kartikadarma, T. Listyorini, and R. Rahim, â€œAn Android mobile RC4 simulation for education,â€ World Trans. Eng. Technol. Educ., vol. 16, no. 1, pp. 75â€“79, 2018.
 R. Rahim, A. S. Ahmar, A. P. Ardyanti, and D. Nofriansyah, â€œVisual Approach of Searching Process using Boyer-Moore Algorithm,â€ J. Phys. Conf. Ser., vol. 930, no. 1, p. 012001, Dec. 2017.
 M. Trinath Basu and J. K. R. Sastry, â€œA fully security included cloud computing architecture,â€ Int. J. Eng. Technol., vol. 7, no. 2.7 Special Issue 7, pp. 807â€“812, 2018.
 B. Prema Sindhuri and M. Kameswara Rao, â€œIoT security through web application firewall,â€ Int. J. Eng. Technol., vol. 7, no. 2â€“7, p. 58, Mar. 2018.
 A. E. S. Kacaribu and Ratnadewi, â€œMultiplying cipher images on visual cryptography with ElGamal algorithm,â€ in 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), 2015, pp. 159â€“162.
 Ratnadewi, R. P. Adhie, Y. Hutama, A. Saleh Ahmar, and M. I. Setiawan, â€œImplementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC),â€ J. Phys. Conf. Ser., vol. 954, no. 1, p. 012009, Jan. 2018.
 R. Rahim, H. Winata, I. Zulkarnain, and H. Jaya, â€œPrime Number: an Experiment Rabin-Miller and Fast Exponentiation,â€ J. Phys. Conf. Ser., vol. 930, no. 1, p. 012032, Dec. 2017.
 D. Abdullah, R. Rahim, D. Apdilah, S. Efendi, T. Tulus, and S. Suwilo, â€œPrime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm,â€ in Journal of Physics: Conference Series, 2018, vol. 978, no. 1, p. 012123.
 R. Rahim, D. Hartama, H. Nurdiyanto, A. S. Ahmar, D. Abdullah, and D. Napitupulu, â€œKeylogger Application to Monitoring Users Activity with Exact String Matching Algorithm,â€ J. Phys. Conf. Ser., vol. 954, no. 1, p. 012008, 2018.
 D. Salomon, Data Compression the Complete Reference FourthEdition, vol. 53, no. 9. Springer, 2007.
 R. Gonzalez and R. Woods, Digital image processing. 2002.
 Y. U. Zheng, â€œTrajectory Data Mining : An Overview,â€ ACM Trans. Intell. Syst. Technol., vol. 6, no. 3, pp. 1â€“41, 2015.
 H. Li and P. Liu, â€œAn Identification System Combined with Fingerprint and Cryptography,â€ in First International Multi-Symposiums on Computer and Computational Sciences (IMSCCSâ€™06), 2006, pp. 105â€“108.
 R. I. Al-Khalid, R. A. Al-Dallah, A. M. Al-Anani, R. M. Barham, and S. I. Hajir, â€œA Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes,â€ J. Softw. Eng. Appl., vol. 10, no. 01, pp. 1â€“10, Jan. 2017.
 S. Bruce, Applied cryptography. 1996.
 T. Nie, C. Song, and X. Zhi, â€œPerformance evaluation of DES and Blowfish algorithms,â€ in 2010 International Conference on Biomedical Engineering and Computer Science, ICBECS 2010, 2010.
 A. Alabaichi, F. Ahmad, and R. Mahmod, â€œSecurity analysis of blowfish algorithm,â€ in 2013 2nd International Conference on Informatics and Applications, ICIA 2013, 2013, pp. 12â€“18.