ANovelty Methods of Cryptography Algorithms Into Layered Cipher Encryption and Decryption

  • Authors

    • A Antoni
    • Solly Aryza
    • Azmi Rizki Lubis
    • Bonar Harahap
    • Mahrani Arfah
    https://doi.org/10.14419/ijet.v7i2.14.14888
  • algorithm, cryptography, decryption, encryption
  • Abstract

    Encryption is one method used to protect or maintain the data. Data that has encrypted will be kept confidential where the contents of the data are altered, so it does not correspond to the actual data. To be able to read data that has been encrypted earlier required a process called decryption. In the science of cryptography, the data will be safeguarded consists of three main components, that is the message that will be read (plaintext), the keys to perform cryptographic techniques (Key), and a random signal that is unreadable (ciphertext). Testing is done by sending the data in the form of words or sentences by using a secret key. Results of analysis of data from tests per-formed show that with the incorporation of some algorithm plated confidentiality of information can be safer because it takes several different stages to solve.

  • References

    1. [1] S. Aryza, M. Irwanto, Z. Lubis, A. P. U. Siahaan, R. Rahim, and M. Furqan, “A Novelty Design Of Minimization Of Electrical Losses In A Vector Controlled Induction Machine Drive,†IOP Conf. Ser. Mater. Sci. Eng., vol. 300, p. 012067, 2018.
      [2] R. Rahim, “Man-in-the-middle-attack prevention using interlock protocol method,†ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp. 6483–6487, 2017.
      [3] R. Rahim et al., “Combination Base64 Algorithm and EOF Technique for Steganography,†J. Phys. Conf. Ser., vol. 1007, p. 012003, Apr. 2018.
      [4] R. Rahim et al., “Combination Vigenere Cipher and One Time Pad for Data Security,†Int. J. Eng. Technol., vol. 7, no. 2.3, pp. 92–94, 2018.
      [5] E. Kartikadarma, T. Listyorini, and R. Rahim, “An Android mobile RC4 simulation for education,†World Trans. Eng. Technol. Educ., vol. 16, no. 1, pp. 75–79, 2018.
      [6] R. Rahim, D. Adyaraka, S. Sallu, E. Sarimanah, and M. M. Rahman, “Tiny encryption algorithm and pixel value differencing for enhancement security message,†Int. J. Eng. Technol., vol. 7, no. 2.9, pp. 82–85, 2018.
      [7] R. Rahim, D. Adyaraka, S. Sallu, E. Sarimanah, and A. Hidayat, “An application data security with lempel - ziv welch and blowfish,†Int. J. Eng. Technol., vol. 7, no. 2.9, pp. 71–73, 2018.
      [8] R. Rahim, H. Nurdiyanto, A. S. Ahmar, D. Abdullah, D. Hartama, and D. Napitupulu, “Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm,†J. Phys. Conf. Ser., vol. 954, no. 1, 2018.
      [9] H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing steganography with government standard algorithm,†in 2017 3rd International Conference on Science in Information Technology (ICSITech), 2017, pp. 366–371.
      [10] R. Rahim, H. Winata, I. Zulkarnain, and H. Jaya, “Prime Number: an Experiment Rabin-Miller and Fast Exponentiation,†J. Phys. Conf. Ser., vol. 930, no. 1, p. 012032, Dec. 2017.
      [11] H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement,†J. Phys. Conf. Ser., vol. 930, no. 1, p. 012005, Dec. 2017.
      [12] R. Rahim, M. Dahria, M. Syahril, and B. Anwar, “Combination of the Blowfish and Lempel-Ziv-Welch algorithms for text compression,†World Trans. Eng. Technol. Educ., vol. 15, no. 3, pp. 292–297, 2017.
      [13] A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,†Int. J. Secur. Its Appl., vol. 10, no. 8, pp. 173–180, Aug. 2016.
      [14] A. S. Ahmar, Rusli, and A. Rahman, “Steps in Designing Queue and Interview Process using Information System: A Case of Re-registration of New Students in Universitas Negeri Makassar,†Asian J. Technol. Manag., vol. 9, no. 1, pp. 52–57, 2016.
      [15] A. S. Ahmar, R. Hidayat, D. Napitupulu, R. Rahim, Y. Sonatha, and M. Azmi, “eConf: an Information System to Manage the Conference,†J. Phys. Conf. Ser., vol. 1028, no. 1, p. 012044, 2018.
      [16] D. Lazim et al., “Information Management and PSM Evaluation System,†Int. J. Eng. Technol., vol. 7, no. 1.6, pp. 17–19, 2018.
      [17] A. Iskandar, E. Virma, and A. S. Ahmar, “Implementing DMZ in Improving Network Security of Web Testing in STMIK AKBA,†Int. J. Eng. Technol., vol. 7, no. 2.3, pp. 99–104, 2018.
      [18] F. A. A. Fauzy et al., “Registration system and UTM games decision using the website application,†Int. J. Eng. Technol., vol. 7, 2018.
      [19] D. Abdullah, R. Rahim, D. Apdilah, S. Efendi, T. Tulus, and S. Suwilo, “Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm,†in Journal of Physics: Conference Series, 2018, vol. 978, no. 1, p. 012123.
      [20] S. Bruce, Applied cryptography. 1996.
      [21] “Implementation of Modified Median Filtering Algorithm for Salt & Pepper Noise Reduction on Image,†Int. J. Sci. Technoledge, pp. 2321–919, 2016.
      [22] H. Aspan and S. Aryza, “Dear Sir/Madam, Elpina, Henry Aspan, Solly Aryza This is to inform you that after a rigorous review process, our review panel has reached a decision about your paper! “,†no. January, p. 76318, 2018.
      [23] Indar Sugiarto, Thiang Thiang, and Timothy Joy Siswanto, “Disain dan Implementasi Modul Akuisisi Data sebagai Alternatif Modul DAQ LabVIEW,†J. Tek. Elektro, vol. 8, no. 1, pp. 30–37, 2008.
      [24] W. Diffie, W. Diffie, and M. E. Hellman, “New Directions in Cryptography,†IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644–654, 1976.
      [25] R. Sadikin, “Kriptografi Untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java,†p. 2012, 2012.
      [26] I. Halik and Y. Prayudi, “Studi dan Analisis Algoritma Rivest Code 6 (RC6) dalam Enkripsi/Dekripsi Data,†Stud. Dan Anal. Algoritm. Rivest Code 6 Dalam Enkripsi/Dekripsi Data, vol. 6, no. D, pp. 149–158, 2005.
      [27] S. Hesari and M. B. N. Sistani, “Efficiency improvement of induction motor using fuzzy-genetic algorithm,†30th Power Syst. Conf. PSC 2015, no. November, pp. 210–216, 2017.
      [28] D. Wirdasari, “Prinsip Kerja Kriptografi dalam Mengamankan Informasi,†Saintikom, vol. 5, no. 2, pp. 174–184, 2008.
      [29] M. Ebrahim, S. Khan, and U. Bin Khalid, “Symmetric Algorithm Survey: A Comparative Analysis,†vol. 61, no. 20, pp. 12–19, 2014.
      [30] T. Bala, “Asymmetric Algorithms and Symmetric Algorithms : A Review,†no. Icaet, pp. 1–4, 2015.
      [31] D. Putra et al., “IMPLEMENTASI ALGORITMA RC4 DAN PLAYFAIR CIPHER Permutasi Untuk S-Box,†Pelita Inform., vol. 16, pp. 328–334, 2017.
      [32] R. Morelli and R. Walde, “Evolving Keys for Periodic Polyalphabetic Ciphers,†no. Rubin 1995, pp. 445–450, 1997.

  • Downloads

  • How to Cite

    Antoni, A., Aryza, S., Rizki Lubis, A., Harahap, B., & Arfah, M. (2018). ANovelty Methods of Cryptography Algorithms Into Layered Cipher Encryption and Decryption. International Journal of Engineering & Technology, 7(2.14), 289-292. https://doi.org/10.14419/ijet.v7i2.14.14888

    Received date: 2018-07-01

    Accepted date: 2018-07-01