Modifikasi Metode One-Time Pad Dan Chaostic Function Untuk Mengamankan Pesan
Abstract
Information is a collection of data in the form of unified text that is public or confidential. Confidential data is data that contains something or not to be published, because the data is important data. For that, the data needs to be secured. One way to secure the data is to use cryptography. Cryptography is a science that plays an important role in the field of information security. Cryptography has mathematical techniques related to information security aspects, such as data confidentiality and integrity, and authentication. Algorithms in cryptography are divided into two, namely symmetric key algorithms and asymmetric key algorithms. One that is included in the symmetric key algorithm is the one time pad. One Time Pad is a symmetric key algorithm that uses alphabetic substitution by using these letters as plaintext and key letters that have comparable positions. However, along with the development of human science, the weaknesses of the one time pad were found. One way to overcome the weaknesses of the one time pad above is to generate a more random key This study describes how the procedure is carried out to modify the key generation used in the one time pad algorithm. Key generation is done based on the Blum Blum Shub key generator, meaning that the key used in the encryption and decryption process is the key generated based on the chaostic function key generator. can be more optimal in securing data.
Downloads
References
Aminudin, A., & Hariyady, H. (2021). Analisa Kombinasi Algoritma AES Dengan Blum-Blum Shub Dan Chaotic Function. Prosiding SENTRA (Seminar Teknologi Dan Rekayasa), 6, 365–373.
Dakhi, O., Masril, M., Novalinda, R., Jufrinaldi, J., & Ambiyar, A. (2020). Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Chiper. Jurnal Inovasi Vokasional Dan Teknologi, 20(1), 27–36.
Dharmaadi, I. P. A., Barmawi, A. M., S, G. B., Informatika, F., & Telkom, I. T. (n.d.). Enkripsi Gambar Parsial dengan Kombinasi Metode Stream Cipher RC4 dan Chaotic Function. 1–8.
Fadillah, R., Idris, A. S., lumban Gaol, D. M., Lubis, G., Meisisri, R., & Syahrizal, M. (2022). Implementasi Algoritma Fast Encryption Algorithm (FEAL) Dan Algoritma Fibonacci Mengamankan File Teks. Prosiding Seminar Nasional Sosial, Humaniora, Dan Teknologi, 295–300.
Fitriyansyah, A. Y., & Hazri, M. (2020). Analisis Security Web Login Mahasiswa Menggunakan Algoritma Two-Factor Time-Based One Time Password. Sainstech: Jurnal Penelitian Dan Pengkajian Sains Dan Teknologi, 30(1).
Harahap, M. K., & Khairina, N. (2017). Analisis Algoritma One Time Pad Dengan Algoritma Cipher Transposisi Sebagai Pengamanan Pesan Teks. Jurnal & Penelitian Teknik Informatika, 1(2), 58–62.
Ii, B. A. B. (2010). Bab ii landasan teori 2.1. M.
Maghfiroh, J. (2022). Pengamanan pesan menggunakan algoritma One Time Pad (OTP) dengan Linear Congruential Generator (LCG) sebagai pembangkit kunci. Universitas Islam Negeri Maulana Malik Ibrahim.
Ramadhani, F., Ramadhani, U., & Basit, L. (2020). Combination of hybrid cryptography in one time pad (otp) algorithm and keyed-hash message authentication code (hmac) in securing the whatsapp communication application. Journal of Computer Science, Information Technology and Telecommunication Engineering, 1(1), 31–36.
Suhandinata, S., Rizal, R. A., Wijaya, D. O., Warren, P., & Srinjiwi, S. (2019). Analisis Performa Kriptografi Hybrid Algoritma Blowfish Dan Algoritma Rsa. JURTEKSI (Jurnal Teknologi Dan Sistem Informasi), 6(1), 1–10. https://doi.org/10.33330/jurteksi.v6i1.395
Sulaiman, O. K., Nasution, K., & Prayogi, S. Y. (2020). Base64 Sebagai Kunci Keamanan pada One Time Pad (OTP). CESS (Journal of Computer Engineering, System and Science), 5(2), 241–244.
Utomo, P., & Zarlis, M. (2017). Algoritma Split-Merge One Time Pad Dalam Peningkatan Enkripsi Data. 0–4.
Wijaya, R. (2022). Enkripsi Nilai Piksel Pada Citra Digital Dengan Algoritma Piecewise Linear Chaotic Map. Bulletin of Computer Science Research, 3(1), 161–169.
Yusfrizal, Y. (2019). Rancang Bangun Aplikasi Kriptografi Pada Teks Menggunakan Metode Reverse Chiper Dan Rsa Berbasis Android. JTIK (Jurnal Teknik Informatika Kaputama), 3(2), 29–37.
Zakti, I. W., Fauzi, A., & Sihombing, A. (2022). Pengacakan Citra Digital Dengan Metode Vertical Bit Rotation (VBR) Memanfaatkan Algoritma One Time Pad (OTP) Sebagai Keamanan Biner. JTIK (Jurnal Teknik Informatika Kaputama), 6(1), 182–190.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Modifikasi Metode One-Time Pad Dan Chaostic Function Untuk Mengamankan Pesan
Pages: 1-4
Copyright (c) 2022 Nyata Manalu

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).













