Implementasi Pisanc Chiper Untuk Autentikasi Voice Chat


  • Muhammad Fajar Rizky * Mail Universitas Budi Darma, Medan, Indonesia
  • Muhammad Syahrizal Universitas Budi Darma, Medan, Indonesia
  • Soeb Aripin Universitas Budi Darma, Medan, Indonesia
  • (*) Corresponding Author
Keywords: Security; Voicemail; Cryptography; Pisanc Cipher

Abstract

In securing voice messages, information sent through the internet network must be authenticated for its authenticity, data content, delivery time, and so on. To prevent data manipulation by irresponsible parties, the creation of a data leak that has a negative impact. The occurrence of data leaks that most users are still not aware of. This can happen due to the lack of security of the message itself which results in problems that arise and also losses by certain authoritarian parties. The solution in securing voice messages using modern cryptographic techniques that have been combined with NRZI encoding and the Feistel network by Pisanc Cipher, is a way to maintain the authenticity and accuracy of data or authentication in voice messages. It is useful to look for the characteristics of good encryption, namely confusion and diffusion. This results in a higher level of security. By using the Pisanc Cipher method to secure voice messages, it can generate security and authenticate data to prevent data leakage. In addition, another benefit of using the Pisanc Cipher method is to maintain the authenticity of voice messages.

Downloads

Download data is not yet available.

References

Usman, "https://www.pengertianmenurutparaahli.net/pengertian-implementasi/," Pengertian Implementasi menurut para ahli, 2002. [Online].

D. N. Novi and E. W. Anang, "PENERAPAN TEKNIK KRIPTOGRAFI STEAM - CHIPER UNTUK PENGAMANAN BASIS DATA," Jurnal Basis Data, vol. Vol. 6, no. No.1, pp. 2-22, 201.

L. Mokh. and A. Putra, "https://docplayer.info/50630911-Enkripsi-dan-dekripsi-pesan-suara-dengan-metode-algoritma-serpent-menggunakan-visual-basic-6-0.html," ENKRIPSI DAN DEKRIPSI PESAN SUARA DENGAN METODE ALGORITMA SERPENT MENGGUNAKAN VISUAL BASIC 6.0. [Online].

P. Arif and N. Nurdin , "ANALISA DAN IMPLEMENTASI KRIPTOGRAFI PADA PESAN RAHASIA MENGGUNAKAN ALGORITMA CIPHER TRANSPOSITION," Jurnal Elektronik Sistem Informasi dan Komputer, vol. Vol.3, no. No.1, pp. 2-11, Januari-Juni 2017.

F. Lazuadi, "http://informatika.stei.itb.ac.id," Kriptografi PISANC CHIPER, 05. 2018-2019. [Online]. [Accessed 01-2019/makalah1 Kriptografi-2019-05.].

E. H. R. D. W. U. d. R. R. S. C. A. Sari, "Penyembunyian Data Untuk Seluruh Ekstansi File Mengguanakan Kriptografi Vernam Cipher dan Bit Shiffing," Journal of Applied Intelligent System, vol. vol.1, pp. 179-190, 2016.

S. M. Melwin Syafrizal, "https://journal.amikom.ac.id/index.php/KIDA/article/download/4475/2170," journal.amikom.ac, pp. 2-13.

s. Fharis , "http://harissitumeangdetektif.apa-itu-cipher-code.html," blogspot.com, 07 2013. [Online].

jakfar, "https://www.scribd.com/document/389239727/Pengertian-Autentikasi," [Online].

"https://www.maxmanroe.com/vid/teknologi/pengertian-chatting.html," Pengertian Chatting dan Contohnya, Fungsi, Serta Manfaatnya. [Online].

S. N, "http://www.pengertianku.net/2015/02/pengertian-chatting-dan-fungsinya-secara-lebih-jelas.html," pengertian-chatting-dan-fungsinya-secara-lebih-jelas., 02 2015. [Online].

D. P. 2, "https://www.dosenpendidikan.com," pengertian-chatting-fungsi-manfaat-dampak/, 10 02 2019.

E. Sutanta, Pengantar Teknologi Informasi, Graha Ilmu., Yogyakarta, 2005.

K. L.V. , "Available:http://www.vbtutor.net/index.php/visual-basic-2010-tutorial/," Visual Basic 2010 Tutorial [online], 6 oktober 2012. [Online].

HEADER AKIB, "Haedar Akib/ Jurnal Administrasi Publik," IMPLEMENTASI KEBIJAKAN:, vol. Volume 1 , no. No. 1 , pp. 2-11, Thn. 2010.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Pisanc Chiper Untuk Autentikasi Voice Chat

Dimensions Badge
Article History
Submitted: 2021-07-26
Published: 2021-08-31
Abstract View: 250 times
PDF Download: 216 times
Section
Articles