Identifikasi Nilai Keacakan Berdasarkan Reposisi Fungsi XOR Pada Blok Kedua LFSR A5/1
Abstract
This research plans a random number generation method using the Linear Feedback Shift Register (LFSR) method with the A5/1 scheme which involves three feedback functions. XOR is used to determine the new output bit value in the next iteration in the feedback mechanism. The test material produces random output for an input using Run Test, Mono Bit, and Block bit. Tests using three feedback functions were carried out to compare with previous research which generated random numbers. Testing of plaintext and ciphertext encryption shows a very small level of correlation with an average value close to 0. The use of LFSR with the A5/1 scheme which involves three XOR functions, creates random output and can be used against Stream Chipers.
Downloads
References
A. D. Wowor and B. Susanto, “One to many (new scheme for symmetric cryptography),” TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 21, no. 4, pp. 762–770, 2023.
R. Rahman et al., Buku Ajar Keamanan Jaringan Komputer. PT. Sonpedia Publishing Indonesia, 2024. [Online]. Available: https://books.google.co.id/books?id=fxUFEQAAQBAJ
A. Ramadhani and A. D. Wowor, “Implementasi Variasi Fungsi XOR dalam Pembangkitan Kunci LFSR pada Skema A5/1 dengan Tiga Blok Bit,” JIKO (Jurnal Inform. dan Komputer), vol. 8, no. 1, pp. 161–173, 2024.
M. Azhari, D. I. Mulyana, F. J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” J. Pendidik. Sains dan Komput., vol. 2, no. 01, pp. 163–171, 2022.
N. G. Najoan and M. A. I. Pakereng, “Modifikasi Skema Teknik Tanam Padi dan Bajak Sawah Berbasis Square Transposition 64-bit,” J. Tek. Inform. dan Sist. Inf., vol. 7, no. 1, 2021.
A. J. Herman, “Desain Pembangkit Kunci LFSR dengan Skema A5/1 Menggunakan 7 Blok Bit Fungsi XOR,” 2022.
R. V. Manullang, “Desain Lima Fungsi Umpan Balik LFSR dengan Skema A5/1 sebagai Pembangkit Kunci Kriptografi Stream Cipher,” 2022.
O. K. Sulaiman, “Generate Pseudo-Random Numbers Linear-Feedback Shift Register (LSFR) Pada Kunci Algoritma One Time Pad (OTP),” in Seminar Nasional Teknologi Komputer & Sains (SAINTEKS), 2020, pp. 171–175.
B. D. Kurniawan, M. A. Rosid, I. A. Kautsar, and N. E. Pratama, “Rancang Bangun Library Web Token untuk Enkripsi HTTP Data Menggunakan Eksklusif-OR (XOR),” Phys. Sci. Life Sci. Eng., vol. 1, no. 1, p. 14, 2023.
R. S. Durga, C. K. Rashmika, O. N. V Madhumitha, D. G. Suvetha, B. Tanmai, and N. Mohankumar, “Design and synthesis of lfsr based random number generator,” in 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), IEEE, 2020, pp. 438–442.
G. Jonatan, I. Syafalni, N. Sutisna, R. Mulyawan, and T. Adiono, “Gaussian Pseudo-Random Number Generator using LFSR’s Rotation and Split,” in 2021 International Symposium on Electronics and Smart Devices (ISESD), IEEE, 2021, pp. 1–5.
N. A. Padjalo, “Implementasi 3 Blok Bit Fungsi XOR untuk Modifikasi Skema LFSR A5/1 dalam Pembangkitan Kunci Kriptografi,” 2023.
S. Angelina, “Optimasi Pembangkit Bilangan Acak Dengan Fungsi Polinomial Dan Kombinasi Metode Iterasi,” 2024.
O. N. E. Choesni, “Implementasi 30x^ 3-19x-6 Sebagai Fungsi Pembangkit Bilangan Acak Menggunakan Metode Newton Raphson,” 2022.
H. Nathanael and A. D. Wowor, “Chaos CSPRNG Design As a Key in Symmetric Cryptography Using Logarithmic Functions,” Komputasi J. Ilm. Ilmu Komput. dan Mat., vol. 21, no. 1, pp. 83–91, 2024.
R. J. Belora, “Implementasi 3x3+ 5x2+ 7x–20 Sebagai Fungsi Generator Menggunakan Meto De Newton Raphson,” 2021.
M. Permadi, “Penggunaan Meto De Fixed Point Ite Ration Dalam Menentukan Pembangkit Bilangan Acak Menggunakan Fungsi Kuadrat X2− 2x–4,” 2021.
C. R. Irianto, “Implementasi Polinomial dan Trigonometri Sebagai Fungsi Komposisi dalam Pembangkit Bilangan Acak Berbasis CSPRNG Chaos,” 2022.
R. P. Prajapat, R. Bhadada, and G. Sharma, “Implementation of Enhanced A5/1 Stream Cipher and its Randomness Analysis by NIST Test Suite,” in 2021 IEEE International Symposium on Smart Electronic Systems (iSES), IEEE, 2021, pp. 426–431.
T. T. M. Bulamey and H. Hendry, “Perancangan Kriptografi Block Cipher Menggunakan Pola Logo Media Sosial,” J. Sist. Komput. dan Inform., vol. 2, no. 2, pp. 115–122, 2021.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Identifikasi Nilai Keacakan Berdasarkan Reposisi Fungsi XOR Pada Blok Kedua LFSR A5/1
Pages: 679-687
Copyright (c) 2024 Jorghie Theodore Kenzo Pallangan, Alz Danny Wowor

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















