Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of Informatics Management and Information Technology

Penerapan Algoritma Gost Dan Mode Output Feedback Untuk Tingkat Keamanan Citra Digital Sri Wahyuni; Surya Darma Nasution; Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.128

Abstract

Digital images that are private and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if it is distributed over the internet such as chat-based applications, WhatsApp and e-mail media. The image that is sent is sometimes an image that is confidential and must be protected. In order to maintain the security of digital images, cryptographic techniques can be used. Cryptographic techniques can secure digital images by changing the pixel values ??of the digital image so that it produces a different pixel value from the original image to be secured. In this study, the algorithm used is the GOST algorithm by adding the OFB technique to optimize the GOST key, and the encryption results can be sent via an application that will be designed with a client-server model. Creating a client-server-based encryption and decryption software application, aimed at transferring digital data in the form of a plain image that has been encrypted using the GOST algorithm, and can be distributed locally using an IP address connected to the same network on the sending and receiving computers (client-server)
Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen Berliana Oktaviani Sinaga; Sinar Sinurat; Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.130

Abstract

Confidential document files must have security both when the file process is sent or stored in the stroge media. This is done so that the confidential document file is not known by someone who does not have authority over the file, or to avoid loss if the file falls into the wrong hands. In order to achieve this, a document file security technique is needed that can convert document file data into unrecognized data. One of the techniques that can be used is cryptography. Cryptography makes use of algorithms to encode document files with an encryption process, and restore document files with a decryption process. One of the algorithms that can be used is the XTEA algorithm. XTEA divides the document file string into 2 parts, namely AL 32 bit and BL 32 bit. The weakness of the XTEA algorithm when carrying out the encryption or decryption process with repeated key scheduling so that it is not effective in optimizing the security of encrypted document files, therefore in this study the Linear Congruential Generator (LCG) method is added to generate XTEA keys. LCG has values ??a, c, m and X0 which triggers to get the XTEA key. So that in the process of distributing encrypted document files, the key sent is the LCG trigger value in the form of a, c, m and X0, if the value is known by the attacker, the encrypted document file cannot be returned. So that the results of the XTEA encryption algorithm with key optimizer based on the LCG method produce a document file cipher that is more optimal in security