Implementasi Algoritma AES, ElGamal, dan SHA3 untuk Keamanan File Digital
(1) Program Studi Informatika
(2) Program Studi Informatika
(3) Program Studi Informatika
(*) Corresponding Author
Abstract
In this modern era, technological developments in the world are developing very quickly. This very rapid technological advancement makes work and exchange of data and information very fast, accurate, and efficient. But with this convenience, new security gaps have also emerged, such as the emergence of crimes in cyberspace (cyber-crime). These actions can be in the form of data theft, breaking someone's password, to distributing software or someone's data without permission. Therefore, this study aims to overcome these security problems by implementing the AES algorithm, ElGamal algorithm, and SHA3 hash function so that they can be used simultaneously to become a secure and solid encryption system.
The testing in this study is divided into three stages, namely testing the system's ability to perform the encryption and decryption process, testing the system speed, and testing the web platform. From the test results, it can be proven that the program can encrypt and decrypt all types of files properly and can detect the authenticity of the file. In web testing, it can be seen that the web is able to send encrypted files to recipients properly without missing anything.
This research produces a software that can perform encryption and decryption of various types of files and can verify if there are changes / modifications to the file. This research also produces a web platform that can be used to send files between users correctly.
From the test results, the program can encrypt files with an average speed of 999.43 bytes/ms and decrypt files with an average speed of 450.38 bytes/ms.Keywords
Full Text:
PDFReferences
Antoni. 2018. Kejahatan Dunia Maya (Cyber Crime) Dalam
Simak Online. Nurani: Jurnal Kajian Syari'ah dan
Masyarakat, 17(2), 261-274.
doi:10.19109/nurani.v17i2.1192.
Azdy, R. A. 2016. Tanda tangan Digital Menggunakan
Algoritme Keccak dan RSA. JNTETI, 5(3).
Bentivenga, C., Christie, F., & Kitson, M. (2010). Keccak
Final Paper. Retrieved from
https://www.cs.rit.edu/~ark/winter2012/482/team/u5/report.p
df.
Gunawan, I. 2018. Kombinasi Algoritma Caesar Cipher dan
Algoritma RSA utuk Pengamanan File Dokumen dan Pesan
Teks. Jurnal Nasional Informatika dan Teknologi Jaringan,
-129.
Hofheinz, D., & Kiltz, E. 2019. Secure Hybrid Encryption
from Weakened Key Encapsulation. pp. 553-571.
Kakish, M. J. 2012. Authenticated and secure el-gamal
cryptosystem over Elliptic curves. International Journal of
Recent Research and Applied Studies, 10(2).
Kurniawan, F., Kusyanti, A., & Nurwarsito, H. 2017. Analisis
dan Implementasi Algoritma SHA-1 dan SHA-3 pada Sistem
Autentikasi Garuda Training Cost. Pengemb. Teknol. Inf. dan
Ilmu Komput., 1(9), 803-812.
Menezes, A. J., Oorschot, P. C., & Vanstone, S. A. 2001.
Handbook of Applied Cryptography. CRC Press.
Paar, C., & Pelzl, J. 2010. Understanding Cryptography.
doi:10.1007/978-3-642-04101-3.
Rachmawati, D., Sharif, A., Jaysilen, & Budiman, M. A. 2018.
Hybrid Cryptosystem Using Tiny Encryption Algorithm and
LUC Algorithm. IOP Conference Series: Materials Science
and Engineering, 300, 12-42. doi:10.1088/1757-
x/300/1/012042.
Romine, C. H. 2015. SHA-3 Standard: Permutation-Based
Hash and Extendable-Output Functions. Retrieved from
http://csrc.nist.gov/publications/drafts/fips202/fips_202_draft.pdf.
Wu, Z., Su, D., & Ding, G. 2014. ElGamal Algorithm for
Encryption of Data Transmission. 2014 International
Conference on Mechatronics and Control (ICMC).
Refbacks
- There are currently no refbacks.
Jurnal telah terindeks oleh :