Implementasi Metode GOST(Government Standard) dan LSB-1(Least Significant Bit) Untuk Mengamankan Teks
Abstract
Securing text data is one of the activities carried out so that the text of an information is kept confidential so that it cannot be known by others except those who are entitled to it. One technique that can be done to optimize the security of text data is to combine cryptographic techniques with the steganography technique. Cryptographic techniques function to encode text data that is kept secret through the encryption process. While the steganography technique serves to hide (embedding) encrypted text data into a media such as image, video, audio. This study describes the process of combining cryptographic techniques and steganography techniques in securing sent text. Cryptographic techniques are used to encode secret messages based on the GOST (Government Standard) method and the steganography technique is used to hide encrypted text into a digital image based on the LSB-1 (Least significant bit-1) algorithm. In order to make the process easier, a secret text security application was built using Visual Basic 2008 programming language
Downloads
References
Zebua. T,” Penerapan metode LSB-2 untuk Menyembunyikan Ciphertext pada citra digital”, Pelita Informatika Budi Darma, vol. X, pp. 135-140, 2015
Hendri, “Pengamanan aplikasi chatting menggunakan metode kriptografi Government standard”, Majalah Ilmiah INTI, Volume 12, pp. 295-300, 2017
Darmayanti, Harsa” Sistem Steganografi pada Citra Digital menggunakan Least Significant Bit”, Prosiding Seminar Sains dan Teknologi FMIPA Unmul Samarinda, Volume 1, pp 51-56. 2016
Krisnawati”Metode Least Sugnificant Bit (LSB) dan end of file (EOF) untuk Menyisipkan teks ke dalam Citra Grayscale”, Seminar Nasional Informatika 2008, pp.49-44. 2008
Doni Ariyus 2006, pengantar ilmu kriptografi, informatika, Bandung
Setyaningsih.E, 2015, Kriptografi &Implementasi menggunakan MATLAB, Andi publisher, Yogyakarta
A.A. Ibrahim, "Perancangan Pengamanan Data Menggunakan Algoritma AES (Advanced Encryption Standard)", Teknik Informatika STMIK Antar Bangsa, vol. III, pp.53-60, 2017
Takur, J, Kumar,N,”DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis” International Journal of Emerging Technology and Advanced Engineering, vol,1, Issue 2, December 2011
E.R. Agustina and A. Kurniati, "Pemanfaatan Kriptografi Dalam Mewujudkan Keamanan Informasi Pada e-Voting di Indonesia", Seminar Nasional Informatika, pp.22-28, 2009
Muhammad Iqbal1, Yudi Sahputra2, Andysah Putera Utama Siahaan3, “The Understanding of GOST Crytography Technique , International Journal of Engineering Trends and Technology (IJETT) – Volume 39 Number 3- September 2016
Munir, R 2006,”Kriptografi,Informatika”,Bandung
Ludmila Babenko, Ekaterina Maro, “Algebraic Cryptanalysis of GOST Encryption Algorithm” Journal of Computer and Communications, 2014, 2, 10-17
Nosrati, Masoud, An introduction to steganography methods,” World Applied Programming, vol 1, pp 191-195, August 2011.
Zebua.T, Pengamanan data teks dengan kombinasi Cipher Blok Chaining LSB-1”. Seminar Nasional Inovasi dan Teknologi Informasi, pp 85-89,2015
Rosa, A.S, Shalahuddin, M, Modul Pembelajaran Rekayasa Perangkat Lunak, Bandung Modula. 2015
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Metode GOST(Government Standard) dan LSB-1(Least Significant Bit) Untuk Mengamankan Teks
Pages: 363-382
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).