Modifikasi Pembentukan Algoritma Rc4 Cipher Dengan Metode Acak Mid-Square Technique Untuk Pengamanan Voice Chat


  • Bambang Noviansyah * Mail Universitas Budi Darma, Medan, Indonesia
  • (*) Corresponding Author
Keywords: Voice Chat; RC4 Algorithm; Mid-Square Technique Algorithm

Abstract

Technological developments and human lifestyles allow access to information systems in new ways, for example using online conversations (chat) via an internet connection, which is often in the form of text communication (text chat) or voice (voice chat). Instant messaging only became popular when the internet began to be widely used in the mid-1990s. Along with the human need for easy and fast communication, the application that can be used is Voice Chat which allows users to carry out voice communication. But the voice chat application is less secure because it is easily intercepted by other parties. Eavesdroppers can easily find out the contents of conversations in instant messaging and the lack of privacy for chat users. The RC4 algorithm has a weakness in its use to encrypt a message. The downside is that Vigenere can only perform encryption and decryption processes for short messages. One way that can be used is to make security for the voice chat application using the Mid-Square Technique algorithm

References

[1] M. Iyas, Jan 2014. [Online]. Available: https://matriasiyas.wordpress.com/2014/01/19/pengertian-algoritma-rc4/.
[2] B. Schneier, Applied Cryptography, Oak Park, 1996.
[3] E. Setyaningsih, Kriptografi & Implementasi Menggunakan Matlab, Yogyakarta, 2015.
[4] R. Munir, Pengantar Kriptografi, Bandung, 2004.
[5] D. Ariyus, Pengantar Ilmu Kriptografi, Andi, 2008.
[6] E. Agustina and A. Kurniati, "Pemanfaatan Kriptografi Dalam Mewujudkan Keamanan Informasi Pada e-Voting di Indonesia," in Seminar Nasional Informatika, 2009.
[7] S. Prabowo, "Kriptografi," Jan 2018. [Online]. Available: http://www.sigitprabowo.id/2013/01/kriptografi-jenis-jenis-serangan-dalam.html.
[8] N. Aleisa, A Comparison of the 3DES and AES Encryptions Standards, 2015.
[9] J. Thakur and N. Khumar, DES,AES ad Blowfish: Symmetric Key Cryptography Algorithm Simulation Based Performance Analysis, 2011.
[10] Mohtashim, April 2015. [Online]. Available: https://tutorialspoint.com/cryptography/cryptography.htm.
[11] Uaies Hafizh, "Teknik Simulasi," 01 November 2011. [Online]. Available: https://uaieshafizh.wordpress.com/2011/11/01/metode-middle-square/.
[12] Wikipedia, "Wikipedia," 27 Maret 2020. [Online]. Available: https://id.wikipedia.org/wiki/Pesan_suara.
[13] F. W. Yudo Untoro, Algoritma Pemograman Dengan Bahasa Java, Yogyakarta, 2010.
[14] M. D. Irwanto, Perancangan Object Oriented Software dengan UML, Yogyakarta, 2007.
[15] M. Yazdi, Pemograman Matlab Pada Sistem Pakar Fuzzy, Yogyakarta, 2017.
[16] S. Al-Hinai, "Algebraic Attacks on Clock-Controlled Stream Chiphers," 2006.
[17] K. Maret 2019. [Online]. Available: https://kiajar.com/pengertian-teks-editorial/.
[18] Mohanmad, "d-HMAC-An improved HMAC algorithm," IJCSIS, vol. Vol.13, no. ISSN 1947-5500, p. No.4, April 2015

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Modifikasi Pembentukan Algoritma Rc4 Cipher Dengan Metode Acak Mid-Square Technique Untuk Pengamanan Voice Chat

Dimensions Badge
Article History
Published: 2022-12-30
Abstract View: 483 times
PDF Download: 389 times
Section
Articles