Penerapan Cover Generation Steganografi Dan Kriptografi RSA Pada Enkripsi Kunci Simetris AES Rijndael Untuk Keamanan Data Dalam Jaringan LAN PT. Hero Supermarket Tbk.

Abimanyu Abimanyu, Ali Mulyanto

Sari


Komunikasi informasi dalam infrastruktur jaringan Lokal Area Network (LAN) PT. Hero Supermarket Tbk. berpotensi munculnya celah keamanan data. Pihak yang tidak sah dapat mengeksplorasi dan mengungkap isi informasi secara ilegal, sehingga menimbulkan resiko terjadinya tindakan interupsi, intersepsi, modifikasi dan fabrikasi. Menghindari hal tersebut diperlukan tindakan proteksi menggunakan metode kriptografi dan steganografi. Kombinasi kunci publik dan kunci privat kriptografi RSA menghasilkan kunci enkripsi dan dekripsi yang berbeda antara pengirim dan penerima. Kriptografi kunci rahasia AES Rijndael menghasilkan berkas yang terenkripsi. Data yang terenkripsi disisipkan ke media lain dengan metode Cover Generation Steganografi, sehingga keberadaan data asli tidak dapat diketahui oleh pihak lain. Verifikasi komparatif fungsi hash SHA-256 menjamin otentikasi data benar-benar valid dari pengaruh perubahan data. Pengujian primalitas MillerRabin diuji untuk menghasilkan nilai eksponen bilangan prima acak kunci RSA yang besar. Ini berarti kemampuan kunci RSA dapat disimpulkan sebagai kunci utama yang berpengaruh dari rangkaian proses enkripsi dan dekripsi data.

Kata Kunci


keamanan data, kriptografi RSA, enkripsi, AES Rijndael, Cover Generation Steganografi

Teks Lengkap:

PDF

Referensi


Andress, Jason. The Basics of Information Security,Elsevier Inc, Waltham, 2011

Arora, Bhavna. A Threat Model Approach for Classification of Network Layer Attacks in WSN, International Journal of Computer Applications (0975-8887) Volume 63– No.9, February 2013

Badillo, Ignacio Algredo. et al. Novel Hardware Architecture for implementing the inner loop of the SHA-2 Algorithms, 2011 14th Euromicro Conference on Digital System Design, IEEE Computer Society,

Carson Ritchey, Philip. Synthetic Steganography: Methods For Generating And Detecting Covert Channels In Generated Media, Purdue University Graduate School, 2015

Cherdantseva, Yulia., and Hilton, Jeremy. Understanding Information Assurance and Security, Technological Dimensions of IS Administrator, IGI Global, September 2014

Divya V. V., Sudha, S. K., dan Resmy, V.R. Simple and Secure Image Encryption, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 2012

K. A., Ajmal. et al. Security using Colors, Figures and Images, International Conference on Emerging Technology Trends on Advanced Engineering Research (ICETT’12) Proceedings published by

International Journal of Computer Applications® (IJCA), Desember 2012

Khan, Khaled M. Developing and Evaluating SecurityAware Software Systems, United States of America by Information Science Reference, IGI Global, ISBN 978-1-4666-2483-2, Hersey PA, 2013

Kumar , Yogesh., Munjal, Rajiv., dan Sharma, Harsh. Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and

Countermeasures, IJCSMS International Journal of Computer Science and Management Studies, Vol. 11, Issue 03 ISSN (Online): 2231-5268, Oktober 2011

Lamberger, Mario., dan Mendel, Florian. Higher-Order Differential Attack on Reduced SHA-256, Institute for Applied Information Processing and Communications Graz University of Technology, Inffeldgasse 16a, A-

Graz, Austria, Januari 2011

Muhammad Abdullah, Ako. Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data, Computer Science Department of Applied Mathematics & Computer Science Eastern Mediterranean University, Cyprus, 2017

National Information Assurance (IA) Glossary, Committee on National Security Systems, CNSS Instruction No. 4009, April 2010

Pavuluru, Rajesh. Miller-Rabin, Desember 2015

Sarkar, Shreekalpa., dan Chatterjee, Srijeet. A Review Paper on ASCII Coded Cryptography for Artificial Neural Networking, IJSRD - International Journal for Scientific Research & Development, Vol. 5, Issue 05,2017

Schneider, G. Michael., dan Gersting, Judith. Invitation to Computer Science, Course Technology, Cengage Learning, Boston, 2010

Singh, Beant Kul., dan Agnihotri, Bhusan. A Method to Hide Secret Information: Steganography, ISSN (Online): 2347 - 2812, Volume-3, Issue-10, 2015

Sweigart, Al. Hacking Secret Ciphers with Python, a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License, ISBN 978-1482614374, 1st Edition, 2013


Refbacks

  • Saat ini tidak ada refbacks.