Claim Missing Document
Check
Articles

Found 8 Documents
Search

Application Of Hiding Messages With Cryptographic Algorithm Modification of Caesar Cipher and Hill Cipher Rini Wijayanti; Siska Febriani; Dony Ariyus
CCIT Journal Vol 13 No 1 (2020): CCIT JOURNAL
Publisher : Universitas Raharja

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (376.972 KB)

Abstract

In the current of information technology, we need a way to properly secure message. Message seurity aims to avoid intruders in communication, because the messages sent are confidential. Which can only be accessed by people who have interests. One way to secure messages is by the cryptographic method. There are many cryptograpic algorithms that can be used, such as Caesar Cipher and Hill Cipher. Both of these algorithms are symetric group cryptographic algorithms, because the keys used in the encryption and decryption process use the same key. To provide a double level security, both algorithm modifications were made. Caesar Cipher carried out the conversion process into binary numbers, and carried out XOR operations by shifting keys as an encryption process. Whereas in the Hill Cipher modification is done by using some Regional Bank codes as a key for message encryption and decryption process. The final process to get the ciphertext end result is to do permutations with a modified formula, which is adjusted to needs. The result of this study are a combination of algorithmsthat can be used to secure messages sent tp recipients. The testing process is done by comparing the size of the original image file used with the size of the resulting file size and the number of characters that can be accommodated.
Implementasi Keamanan Pesan pada Citra Steganografi Menggunakan Modifikasi Cipher Block Chaining (CBC) Vigenere Hanifatus Sadiyah; Vera Wati; Dony Ariyus
Telematika Vol 13, No 1: Februari (2020)
Publisher : Universitas Amikom Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35671/telematika.v13i1.942

Abstract

Abstract: Internet of Things (IoT) provides easy transportation of data and information, but on the other hand provides opportunities for cyber-terrorists and attackers to carry out attacks on data and information so that security of data and information is needed. This study aims to combine cryptographic techniques with classical algorithm that is Vigenere Cipher and modern algorithms that Cipher Block Chaining (CBC), which will be integrated with steganographic techniques Least Significant Bit (LSB) to insert the message information on an object image so as to provide data security and information more. It is expected to be able to support services in various fields so that digital watermarks on images can be used. Testing with 25 times the encryption and decryption process was successfully carried out 18 times and failed 7 times, influenced by the size and dimensions of the image. Performance on this algorithm is able to accommodate both symbols, characters and numbers. However, changes in image size affect the process of decryption and encryption.Abstrak: Internet of Things (IoT) menghadirkan kemudahan pertukaran data dan informasi, namun demikian di sisi lain memberikan peluang kepada cyber-terrorist dan penyerang untuk melakukan serangan terhadap data dan informasi sehingga pengamanan data dan informasi diperlukan. Penelitian ini bertujuan mengkombinasikan teknik kriptografi dengan algoritme klasik yaitu Vigenere Cipher dan algoritma modern yaitu Cipher Block Chaining (CBC) yang akan diintegrasikan dengan teknik steganografi Least Significant Bit (LSB) untuk menyisipkan pesan informasi di sebuah objek gambar sehingga memberikan keamanan data dan informasi yang lebih tinggi. Diharapkan mampu mendukung layanan berbagai bidang sehingga mampu digunakan digital watermark pada gambar. Hasil penelitian yang telah dilakukan menghasilkan visualisasi tidak adanya perbedaan pesan yang belum dan sudah terenkripsi. Pengujian dengan 25 kali proses enkripsi dan dekripsi berhasil dilakukan sebanyak 18 kali dan gagal sebanyak 7 kali, dipengaruhi oleh ukuran dan dimensi citra. Kinerja pada algoritma ini mampu menampung dengan baik simbol, karakter dan angka. Namun perubahan pada size gambar berpengaruh ketika proses dekripsi dan enkripsi. 
Combination of XOR Binary Algorithm and Steganography Using Least Significant Bit (LSB) Method for Data Security Yulius Nahak Tetik; Friden Elefri Neno; Dony Ariyus
Compiler Vol 8, No 2 (2019): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1045.233 KB) | DOI: 10.28989/compiler.v8i2.471

Abstract

Along with the development of technology and information today, data security is a problem that needs to be done to maintain the confidentiality of data or information both personally and within an organization. Cryptography is one of the sciences or arts that learns about how to secure data or information from irresponsible parties who want to destroy important data in the form of text and image files. This research, data security technique uses two algorithms, namely steganography to enter text in image media using LSB (Least Significant Bit) method and Binary XOR used to convert messages to binary with XOR keywords and generate pixel values of messages from 8 bits of images with LSB (Least Significant Bit). After encrypted the image will be sent to the user, and to view the original data, the user must decrypt the data with the message key and retrieve the LSB (Least Significant Bit) value, from the encrypted image.
Analisis Histogram Steganografi Least Significant Bit Pada Citra Grayscale Nur Fitrianingsih Hasan; Christin Nandari Dengen; Dony Ariyus
Digital Zone: Jurnal Teknologi Informasi dan Komunikasi Vol. 11 No. 1 (2020): Digital Zone: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Publisher: Fakultas Ilmu Komputer, Institution: Universitas Lancang Kuning

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (709.765 KB) | DOI: 10.31849/digitalzone.v11i1.3413

Abstract

Kesadaran pentingnya keamanan data pada era digital saat ini ditandai dengan berkembangnya aplikasi keamanan data. Pada penelitian ini akan dilakukan analisis histogram terhadap suatu aplikasi keamanan data. Tujuan dari analisa ini adalah mengetahui perubahan histogram yang dilakukan penyisipan pesan. Hasilnya penyisipan pesan pada citra menggunakan Least Significant Bit secara visual tidak terlihat perubahan. Analisis histogram menunjukkan perubahan grafik terlihat lebih signifikan pada file gambar .tif, .png dan .jpg sementara .bmp tidak signifikan. Jumlah karakter yang disisipkan mempengaruhi grafik histogram. Stego image yang dihasilkan memenuhi syarat imperceptibility. Dibuktikan dari nilai PSNR yang dihasilkan yaitu PSNR >40db. Perubahan ekstensi image menjadi salah satu faktor hasil nilai PSNR. Dibuktikan dengan ekstensi image .bmp memiliki nilai MSE paling rendah dan PSNR paling tinggi yaitu, MSE=0,66141 dan PSNR=49,9601. Kata kunci: Histogram, Steganografi, LSB, Grayscale, PSNR Abstract Awareness of the importance of data security in the current digital era is marked by the development of data security applications. In this study a histogram analysis of a data security application will be performed. The purpose of this analysis is to determine the histogram changes made by message insertion. The result is the insertion of messages in the image using Least Significant Bit visually does not change. Histogram analysis shows that graph changes are more significant in .tif, .png and .jpg image files while .bmp is not significant. The number of characters inserted affects the histogram graph. The resulting stego image meets the requirements of imperceptibility. Proven from the PSNR value generated is PSNR>40dB. The change in image extension is one of the factors resulting from the PSNR value. Evidenced by the extension .bmp image has the lowest MSE value and the highest PSNR, namely, MSE=0.66141 andPSNR=49.9601. Keywords: Histogram, Steganography, LSB, Grayscale, PSNR.
Encrypt & Decrypt Text using Hill Cipher Fajar Sudana Putra; Dony Ariyus
Jurnal Rekayasa Teknologi Informasi (JURTI) Vol 5, No 1 (2021): Jurnal Rekayasa Teknologi Informasi (JURTI)
Publisher : Universitas Mulawarman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30872/jurti.v5i1.4153

Abstract

Kriptografi banyak digunakan sebagai cara agar pesan rahasia dapat tersampaikan ke seseorang. Pesan tersebut di enkripsi agar orang yang tidak berhak untuk membaca pesan tersebut tidak akan dapat membacanya. Namun, penggunaan kriptografi sering kali dapat dipecahkan/diselesaikan oleh orang lain karena terkadang kunci dari pesan tersebut tidak sulit untuk dipecahkan. Dalam tulisan ini, penulis memodifikasi metode Hill Cipher yang menghasilkan chipertext berupa kode plat suatu wilayah provinsi dan luas wilayah provinsi tersebut.
Modification of Two Algorithms Playfair And Caesar Chiper Al-gorithm Using Postal Code City: Modification of Two Algorithms Playfair And Caesar Chiper Al-gorithm Using Postal Code City Sewindu Putro; Sumbogo Wisnu Pamungkas; Dony Ariyus
Jurnal Mantik Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (642.389 KB)

Abstract

Privacy and data security is one of the most important aspects that need to be addressed, especially in this digital age where all desktop and mobile computing devices can be connected to one another in a virtual world that causes virtually impossible to protect the message to its destination. The purpose of this study is a modification of the Playfair cipher algorithm and caesar cipher with the postal code of the city, aims to produce a ciphertext that is more complex and not easily solved. In this penelian also implement LSB steganography method so that the message content more secure and not readily known by those who do not have an interest. From the test results of this study showed that by modifying the Playfair cipher algorithm and caesar cipher with city postal code in the encoding, produce ciphertext more complicated to be returned to the original message by parties who have no interest. Applying LSB steganography method makes the observer is not aware of the information that is pasted on the image that acts as a message.
Message Encryption Using Spinning Caesar XOR Binary Cryptography Algorithm (SPICA-XB): Message Encryption Using Spinning Caesar XOR Binary Cryptography Algorithm (SPICA-XB) Akrilvalerat Deainert Wierfi; Agung Jasuma; Dony Ariyus
Jurnal Mantik Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (521.681 KB)

Abstract

Data security is a mechanism to protecting data and any attempt to impose limits on a system for access that does not have an authority (unauthorized person) causes poses a risk to valuable fan-sensitive information. To improve security in the text, images, video, and audio can be done by using two data security techniques such as cryptography and steganography. Cryptography is the process of plaintext to ciphertext randomizing using certain patterns. The secret message steganography focuses on inserting data or secret messages into other data such as text, images, video or audio. To increasing the security of data hiding, a combination of the two techniques is used wherein the initial data or message will be encrypted using the SPICA-XB algorithm which is a combination of two cryptographic algorithms namely spinning caesar and binary XOR.
PENGAMANAN PESAN MENGGUNAKAN KOMBINASI METODE KRIPTOGRAFI RSA, VIGENERE CIPHER, DAN HILL CIPHER DENGAN METODE STEGANOGRAFI LEAST SIGNIFICANT BIT Raynaldi Fatih Amanullah; Bayu Trisna Pratama; Dony Ariyus
Jurnal Teknomatika Vol 11 No 2 (2019): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pengamanan privasi dan kepemilikan informasi telah menjadi isu yang penting dan patut diteliti di era keterbukaan informasi seperti sekarang ini. Keamanan data berfokus pada bagaimana sebuah pesan dapat dijaga kerahasiannya dari pengirim ke penerima. Kriptografi dan Steganografi merupakan salah satu metode yang dapat digunakan untuk mengamankan data. Kombinasi keduanya akan membuat keamanan dalam komunikasi data menjadi lebih kuat. Penelitian ini dilakukan untuk mengembangkan sebuah metode pengamanan pesan dengan menggunakan kombinasi metode kriptografi RSA, Vigenere Cipher, dan Hill Cipher dengan metode steganografi Least Significant Bit (LSB). Metode tersebut kemudian diuji dengan melakukan perubahan warna, ukuran serta pemotongan pada media penyimpan pesan. Hasil pengujian menunjukkan bahwa dalam beberapa kondisi, pesan yang ada dalam media masih dapat dibaca dan didekripsi ke bentuk asalnya.