Implementasi Algoritma AES, ElGamal, dan SHA3 untuk Keamanan File Digital

Joshua Allan Saputra(1*), Justinus Andjarwirawan(2), Lily Puspa Dewi(3),


(1) Program Studi Informatika
(2) Program Studi Informatika
(3) Program Studi Informatika
(*) Corresponding Author

Abstract


In this modern era, technological developments in the world are developing very quickly. This very rapid technological advancement makes work and exchange of data and information very fast, accurate, and efficient. But with this convenience, new security gaps have also emerged, such as the emergence of crimes in cyberspace (cyber-crime). These actions can be in the form of data theft, breaking someone's password, to distributing software or someone's data without permission. Therefore, this study aims to overcome these security problems by implementing the AES algorithm, ElGamal algorithm, and SHA3 hash function so that they can be used simultaneously to become a secure and solid encryption system.

The testing in this study is divided into three stages, namely testing the system's ability to perform the encryption and decryption process, testing the system speed, and testing the web platform. From the test results, it can be proven that the program can encrypt and decrypt all types of files properly and can detect the authenticity of the file. In web testing, it can be seen that the web is able to send encrypted files to recipients properly without missing anything.

This research produces a software that can perform encryption and decryption of various types of files and can verify if there are changes / modifications to the file. This research also produces a web platform that can be used to send files between users correctly.

From the test results, the program can encrypt files with an average speed of 999.43 bytes/ms and decrypt files with an average speed of 450.38 bytes/ms.

Keywords


AES algorithm; ElGamal algorithm; SHA3 algorithm; encryption; security; file

Full Text:

PDF

References


Antoni. 2018. Kejahatan Dunia Maya (Cyber Crime) Dalam

Simak Online. Nurani: Jurnal Kajian Syari'ah dan

Masyarakat, 17(2), 261-274.

doi:10.19109/nurani.v17i2.1192.

Azdy, R. A. 2016. Tanda tangan Digital Menggunakan

Algoritme Keccak dan RSA. JNTETI, 5(3).

Bentivenga, C., Christie, F., & Kitson, M. (2010). Keccak

Final Paper. Retrieved from

https://www.cs.rit.edu/~ark/winter2012/482/team/u5/report.p

df.

Gunawan, I. 2018. Kombinasi Algoritma Caesar Cipher dan

Algoritma RSA utuk Pengamanan File Dokumen dan Pesan

Teks. Jurnal Nasional Informatika dan Teknologi Jaringan,

-129.

Hofheinz, D., & Kiltz, E. 2019. Secure Hybrid Encryption

from Weakened Key Encapsulation. pp. 553-571.

Kakish, M. J. 2012. Authenticated and secure el-gamal

cryptosystem over Elliptic curves. International Journal of

Recent Research and Applied Studies, 10(2).

Kurniawan, F., Kusyanti, A., & Nurwarsito, H. 2017. Analisis

dan Implementasi Algoritma SHA-1 dan SHA-3 pada Sistem

Autentikasi Garuda Training Cost. Pengemb. Teknol. Inf. dan

Ilmu Komput., 1(9), 803-812.

Menezes, A. J., Oorschot, P. C., & Vanstone, S. A. 2001.

Handbook of Applied Cryptography. CRC Press.

Paar, C., & Pelzl, J. 2010. Understanding Cryptography.

doi:10.1007/978-3-642-04101-3.

Rachmawati, D., Sharif, A., Jaysilen, & Budiman, M. A. 2018.

Hybrid Cryptosystem Using Tiny Encryption Algorithm and

LUC Algorithm. IOP Conference Series: Materials Science

and Engineering, 300, 12-42. doi:10.1088/1757-

x/300/1/012042.

Romine, C. H. 2015. SHA-3 Standard: Permutation-Based

Hash and Extendable-Output Functions. Retrieved from

http://csrc.nist.gov/publications/drafts/fips202/fips_202_draft.pdf.

Wu, Z., Su, D., & Ding, G. 2014. ElGamal Algorithm for

Encryption of Data Transmission. 2014 International

Conference on Mechatronics and Control (ICMC).


Refbacks

  • There are currently no refbacks.


Jurnal telah terindeks oleh :