Implementasi Keamanan Pesan pada Citra Steganografi Menggunakan Modifikasi Cipher Block Chaining (CBC) Vigenere

Hanifatus Sadiyah, Vera Wati, Dony Ariyus

Abstract


Abstract: Internet of Things (IoT) provides easy transportation of data and information, but on the other hand provides opportunities for cyber-terrorists and attackers to carry out attacks on data and information so that security of data and information is needed. This study aims to combine cryptographic techniques with classical algorithm that is Vigenere Cipher and modern algorithms that Cipher Block Chaining (CBC), which will be integrated with steganographic techniques Least Significant Bit (LSB) to insert the message information on an object image so as to provide data security and information more. It is expected to be able to support services in various fields so that digital watermarks on images can be used. Testing with 25 times the encryption and decryption process was successfully carried out 18 times and failed 7 times, influenced by the size and dimensions of the image. Performance on this algorithm is able to accommodate both symbols, characters and numbers. However, changes in image size affect the process of decryption and encryption.

Abstrak: Internet of Things (IoT) menghadirkan kemudahan pertukaran data dan informasi, namun demikian di sisi lain memberikan peluang kepada cyber-terrorist dan penyerang untuk melakukan serangan terhadap data dan informasi sehingga pengamanan data dan informasi diperlukan. Penelitian ini bertujuan mengkombinasikan teknik kriptografi dengan algoritme klasik yaitu Vigenere Cipher dan algoritma modern yaitu Cipher Block Chaining (CBC) yang akan diintegrasikan dengan teknik steganografi Least Significant Bit (LSB) untuk menyisipkan pesan informasi di sebuah objek gambar sehingga memberikan keamanan data dan informasi yang lebih tinggi. Diharapkan mampu mendukung layanan berbagai bidang sehingga mampu digunakan digital watermark pada gambar. Hasil penelitian yang telah dilakukan menghasilkan visualisasi tidak adanya perbedaan pesan yang belum dan sudah terenkripsi. Pengujian dengan 25 kali proses enkripsi dan dekripsi berhasil dilakukan sebanyak 18 kali dan gagal sebanyak 7 kali, dipengaruhi oleh ukuran dan dimensi citra. Kinerja pada algoritma ini mampu menampung dengan baik simbol, karakter dan angka. Namun perubahan pada size gambar berpengaruh ketika proses dekripsi dan enkripsi.

 


Keywords


Kriptografi; Cipher Block Chaining; Vigenere; LSB; Keamanan Data

Full Text:

pdf (Indonesian)

References


Abomhara, M. and Koien, G. (2015) ‘Cyber Security and the Internet of Things : Vulnerabilities , Threats , Intruders Cyber Security and the Internet of Things : Vulnerabilities , Threats , Intruders’, Journal of Cyber Security, 4(May), pp. 65–88. doi: 10.13052/jcsm2245-1439.414.

Anderson, R. (1989) ‘Cryptanalytic Properties Of Short Substitution’, Taylor & Francis, XIII(1), pp. 61–72. doi: 10.1080/0161-118991863772.

Atzori, L., Iera, A. and Morabito, G. (2010) ‘The Internet of Things : A survey’, Computer Networks ELSEVIER. Elsevier B.V., 54(15), pp. 2787–2805. doi: 10.1016/j.comnet.2010.05.010.

Dashti, A., Kheradmand, H. A. and Jazi, M. D. (2016) ‘Comparison Of Three Modes Of Cryptography Operation For Providing Security and Privacy Based on Important Factors’, Information Technology & Electrical Engineering, 5(3), pp. 7–12.

Goutam, R. K. (2015) ‘Importance of Cyber Security’, International Journal of Computer Applications, 111(7), pp. 14–17.

Handoko, L. B. et al. (2019) ‘Digital Signature Pada Citra Menggunakan Rsa Dan Vigenere Cipher Berbasis Md5’, SIMETRIS, 10(1), pp. 357–366.

Hidayat, M. H., Gerhana, Y. A. and Syaripudin, U. (2018) ‘Kombinasi Algoritme Kriptografi Vigenere Chiper dan Hill Cipher untuk Penyandian Pesan Rahasia pada Metode Steganografi’, INSIGHT, 1(1), pp. 125–131.

Humendru, F. and Zebua, T. (2018) ‘Implementation of Triple Transposition Vegenere Cipher Algorithm and Cipher Block Chaining for Encoding Text’, International Journal of Informatics and Computer Science, 2(1), pp. 26–31.

Ijemaru, G. K. et al. (2018) ‘Security Challenges of Wireless Communications Networks : A Survey Security Challenges of Wireless Communications Networks : A Survey’, International Journal of Applied Engineering Research, 13(8), pp. 5680–5692.

ITU (2017) ‘The world in 2017: ICT facts and figures’, International Telecomummication Union, July.

Johnson, N. F. and Mason, G. (no date) ‘Exploring Steganography: Seeing the Unseen’, IEEE, Computing Practices, 31(2), pp. 26–34.

Kavitha et al. (2012) ‘Steganography Using Least Signicant Bit Algorithm’, International Journal of Engineering Research and Applications (IJERA), 2(3), pp. 338–341.

Kester, Q. (2012) ‘A Cryptosystem Based on Vigenère Cipher with Varying Key’, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1(10), pp. 108–113.

Kizza, J. M. (2013) Guide to Computer Network Security. Springer.

Laskar, S. A. and Hemachandran, K. (2012) ‘Secure Data Transmission Using Steganography And Encryption’, International Journal on Cryptography and Information Security (IJCIS), 2(3), pp. 161–172. doi: 10.5121/ijcis.2012.2314.

Lestiawan, H. and Purnama, R. D. O. (2016) ‘Pengamanan Dokumen Teks Menggunakan Algoritme Kriptografi Mode Operasi Cipher Block Chaining ( CBC ) Dan Steganografi Metode End Of File ( EOF )’, Techno.com, 15(1), pp. 22–31.

Li, B. et al. (2011) ‘A Survey on Image Steganography and Steganalysis’, Journal of Information Hiding and Multimedia Signal Processing, 2(2), pp. 142–172.

Maruf, F., Riadi, I. and Prayudi, Y. (2015) ‘Merging of Vigenére Cipher with XTEA Block Cipher to Encryption Digital Merging of Vigenére Cipher with XTEA Block Cipher to Encryption Digital Documents’, International Journal of Computer Applications, 132(1), pp. 27–33. doi: 10.5120/ijca2015907262.

Permana, A. A. (2018) ‘Penerapan Kriptografi Pada Teks Pesan dengan Menggunakan Metode’, Jurnal Al-Azhar Indonesia Seri Sains Dan Teknologi, 4(3), pp. 110–115.

Raphael, A. J. and Sundaram, D. V. (2010) ‘Cryptography and Steganography – A Survey’, Int. J. Comp. Tech. Appl, 2(3), pp. 626–630.

Senthil, K., Prasanthi, K. and Rajaram, R. (2013) ‘A Modern Avatar of Julius Ceasar and Vigenere Cipher’, IEEE International Conference on Computational Intelligence and Computing Research, pp. 13–15. doi: 10.1109/ICCIC.2013.6724170.

Sinkov, A. (2009) Elementary Cryptanalysis: A Mathematical Approach. Second Edi. United States of America: The Mathematical Association of Amerika.

Song, S. et al. (2011) ‘A Novel Secure Communication Protocol Combining Steganography and Cryptography’, Elsevier Inc, Advanced in Control Engineering and Information Science, 15, pp. 2767–2772. doi: 10.1016/j.proeng.2011.08.521.

Syawal, M. F., Fikriansyah, D. C. and Agani, N. (2016) ‘Implementasi Teknik Steganografi Menggunakan Algoritme Vigenere Cipher Dan Metode LSB’, Jurnal TICOM, 4(3), pp. 91–99.

Taneja, M. (2013) ‘An Analytics Framework to Detect Compromised IoT Devices using Mobility Behavior’, International Conference on ICT Convergence (ICTC) IEEE, pp. 38–43.

Tiwari, A., Yadav, S. R. and Mittal, N. K. (2014) ‘A Review on Different Image Steganography Techniques’, International Journal of Engineering and Innovative Technology (IJEIT), 3(7), pp. 121–124.

Wikibooks (2020) Visual Basic for Applications.

Zebua, T. (2015) ‘Pengamanan Data Teks Dengan Kombinasi Cipher Block Chaining dan LSB-1’, Seminar Nasional Inovasi dan Teknologi (SNITI), 2015(September), pp. 85–89. Available at: sniti.info.

Zou, Y. et al. (2016) ‘A Survey on Wireless Security : Technical Challenges , Recent Advances , and Future Trends’, Proceedings of the IEEE, 104(9), pp. 1727–1765.




DOI: http://dx.doi.org/10.35671/telematika.v13i1.942

Refbacks

  • There are currently no refbacks.




Indexed by:

      http://click.accelo.com/wf/click?upn=KMJOFt8368XHDV6m09YF-2BTGnIfzAj8ov81j3S3dKrgX-2FSP8SBOSe2Y-2FRl3XtyVdizj-2FkXxL-2F-2FBp-2BQ3h3JmTUMA-3D-3D_m-2BrHp932aZXzO0XgkbwedgKvn5QWlonE5sMgaivZdq7OsTVSTY4hEqzD-2Bq18nXAyLJBneuiZlt38H2UV92XxYUTcMxEriSXBXl4R62YQbqlgPCj4HTJTRlEeMBija8NFLIgPs2I1UuCR2UCZXSiKb2ocM6V4QaW-2FslHJUiSZesKuX9OlsnCNztILLyuQC4ZZvCegHVeQWDMYSYLvWzv-2FxgZ4v9s-2B2Ehf-2FEsLNi2Ea97Xe1t2vA4kmxioKhj90qGfUs7WlNUb-2B3FL0DjX8F4BTUuUiemqtsGMdQg-2By7qV9RY-3D     

Telematika

ISSN 2442-4528 (online) | ISSN 1979-925X (print)
Published by : Universitas Amikom Purwokerto
Jl. Let. Jend. POL SUMARTO Watumas, Purwonegoro - Purwokerto Telp (0281) 623321 Fax (0281) 621662
Email: telematika@amikompurwokerto.ac.id

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.