Other thesis. Security and confidentiality of data is currently a very important issue and continues to grow. Some cases involving data security is. Encryption process is done through a process of encryption, namely changing the original message in the form of plain text into other forms of encrypted cipher text.
|Published (Last):||14 August 2016|
|PDF File Size:||10.50 Mb|
|ePub File Size:||7.42 Mb|
|Price:||Free* [*Free Regsitration Required]|
One technique to minimize the above measures is the utilization of cryptographic techniques. Cryptography techniques can secure digital images by modifying the image pixel values so that the resulting image is different from the original image.
An RC4 algorithm can be used in realizing the purpose of cryptographic technique. But this algorithm has a weakness where the solving of this algorithm with know plaintext attack or know ciphertext only can be done easily. This research describes the security of digital images based on RC4 algorithm modification.
The modification is to add an initial vector block in the process of encryption and decryption and shift a number of bits in a certain position. The result of this research is a digital image with pixel values that are much different from the original pixel value to make it difficult for others in manipulating the secret image. Contact support if you believe your content has been flagged in error. Version: 2. Submitted: April 03, Last edited: July 02, Download paper Downloads: Abstract Digital images of a private and confidential very extend to wiretapping by other parties, especially when the image is distributed over the internet.
The result of this research is a digital image with pixel values that are much different from the original pixel value to make it difficult for others in manipulating the secret image See less.
PENGAMANAN CITRA DIGITAL BERDASARKAN MODIFIKASI ALGORITMA RC4
Abstrack — SMS now becomes such a need for cellular phone users to communicate to other people. But the cellular phone users do not realize that the sent messages could be intercepted or changed by an unwanted party. Therefore it requires a security in sending an SMS message which is called cryptography. Given limited resources on cellular phone, then the implementation of symmetric cryptographic technique is suitable to meet the security needs of an SMS message. In symmetric cryptography, there is a symmetric key for encryption and decryption process. In order to secure exchange of symmetric keys in public channels is required of a protocol for key exchange.
Enkripsi Data Menggunakan Algoritma RC4
Ke a manan dan kerahasian merupakan aspek penting dari suatu pesan, data maupun informasi baik berupa data teks, gambar maupun video. Salah satu cara untuk melindungi data citra digital tersebut dengan cara dekripsi dan enkripsi. RC4 merupakan salah satu algoritma kriptografi yang terkenal dengan kecepatannya dan sederhana sehingga dapat diimplementasikan baik pada perangkat keras maupun perangkat lunak dan digunakan sebagai standar protokol keamanan pengiriman data. Berdasarkan latar belakang tersebut maka pada penelitian ini dilakukan pengujian untuk mengetahui kemampuan maksimal dari algoritma RC4 yang ditinjau dari waktu pemrosesan baik pada enkripsi maupun dekripsi citra. Hasil pengujian meunjukkan waktu tercepat diperoleh dari citra berformat JPEG baik pada enkripsi maupun dekripsi citra untuk citra berukuran x pixel maupun x pixel. Jurnal Teknologi Informasi Techno.
Start managing your projects on the OSF today.
While it is remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure. As of [update] , there is speculation that some state cryptologic agencies may possess the capability to break RC4 when used in the TLS protocol. RC4 was initially a trade secret , but in September a description of it was anonymously posted to the Cypherpunks mailing list. The leaked code was confirmed to be genuine as its output was found to match that of proprietary software using licensed RC4. Because the algorithm is known, it is no longer a trade secret.