Maximum Security of Login Pin Data by Combining the Gifshuffle Algorithm and TCC Algorithm

Rivalri Kristianto Hondro(1*),

(1) Universitas Budi Darma
(*) Corresponding Author

Abstract


System or data security is very important in today's digital era. Various kinds of security techniques used, one of these techniques is the encoding technique by applying a number of cryptographic algorithms. The durability of cryptographic algorithms must of course be known before the algorithm is used and applied to a system or data to be secured. This study discusses the combination of the gifshuffle algorithm and the TCC algorithm for securing login pin characters

Full Text:

Pdf

References


L. J. Pangaribuan, “Kripografi Hybrida Algoritma Hill cipher dan Rivest Shamir (RSA) Sebagai Pengembangan Kriptografi Kunci Simetris,” J. Teknol. Inf. dan Komun., 2018.

A. Hariati, K. Hardiyanti, and W. E. Putri, “Kombinasi Algoritma Playfair Cipher Dengan Metode Zig-zag Dalam Penyandian Teks,” Sinkron, 2018.

R. Arifin and L. T. Oktoviana, “Implementasi Kriptografi Dan Steganografi Menggunakan Algoritma RSA Dan Metode LSB,” J. Din. Inform., 2013.

D. Lombu, S. D. Tarihoran, and I. Gulo, “Kombinasi Mode Cipher Block Chaining Dengan Algoritma Triangle Chain Cipher Pada Penyandian Login Website,” J-SAKTI (Jurnal Sains Komput. dan Inform., 2018, doi: 10.30645/j-sakti.v2i1.51.

“Perancangan Perangkat Lunak Steganografi Menggunakan Least Significant Bit Dengan Enkripsi Vigenere Cipher,” e-Jurnal JUSITI (Jurnal Sist. Inf. dan Teknol. Informasi), 2020, doi: 10.36774/jusiti.v9i1.643.

Z. Sun, H. Wu, Z. Zhou, and H. Kang, “On steganography detection of palette based images,” J. Inf. Comput. Sci., 2008.

T. M. Fernandez-Carames and P. Fraga-Lamas, “Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks,” IEEE Access, vol. 8, pp. 21091–21116, 2020, doi: 10.1109/ACCESS.2020.2968985.

Febriansyah, “Analisis dan Perancangan Keamanan Data Menggunakan Algoritma Kriptografi DES (Data Encyption Standard),” Skripsi, vol. XV, no. November, pp. 1–2, 2022.

Z. Basim and P. Painem, “Implementasi Kriptografi Algoritma RC4 Dan 3DES dan Steganografi Dengan Algoritma EOF Untuk Keamanan Data Berbasis Desktop Pada SMK As-Su’udiyyah,” Skanika, vol. 3, no. 4, pp. 45–52, 2020, [Online]. Available: http://jom.fti.budiluhur.ac.id/index.php/SKANIKA/article/view/1739

D. Anggara and A. S. Sembiring, “Peningkatan Keamanan Data Teks Terenkripsi Algoritma Luciver Menggunakan Steganografi Gifshuffle Pada Citra,” KOMIK (Konferensi Nas. Teknol. Inf. dan Komputer), 2019, doi: 10.30865/komik.v3i1.1626.

S. Rohayah, G. W. Sasmito, and O. Somantri, “Aplikasi Steganografi Untuk Penyisipan Pesan,” J. Inform., 2015, doi: 10.26555/jifo.v9i1.a2038.

D. Andika and D. Darwis, “Modifikasi Algoritma Gifshuffle untuk Peningkatan Kualitas Citra pada Steganografi,” Program, vol. 1, no. 2, pp. 1–9, 2020.

P. Tarigan, H. Sunandar, B. Sinuraya, Z. Arizona Matondang, and G. Ginting, “Implementation of Triangle Chain Cipher Algorithm in Security Message of Social Media,” J. Phys. Conf. Ser., vol. 1573, no. 1, 2020, doi: 10.1088/1742-6596/1573/1/012024.

C. H. Bennett, “Quantum cryptography: Public key distribution and coin tossing,” Int. Conf. Comput. Syst. Signal Process., vol. 1999, no. December, pp. 1–6, 2006.

R. A. Larasati, “Analisis Teknik Steganografi pada Data di Dinas Komunikasi dan Infomatika Penajam Paser Utara Menggunakan Openstego dan Hex Editor Neo,” Repos. Itk, vol. 1, no. 1, 2021, [Online]. Available: http://repository.itk.ac.id/id/eprint/17276




DOI: https://doi.org/10.30645/ijistech.v6i2.231

Refbacks

  • There are currently no refbacks.







Jumlah Kunjungan:

View My Stats

Published Papers Indexed/Abstracted By: