IMPLEMENTATION OF A COMBINATION OF ADVANCED ENCRYPTION STANDARD CRYPTOGRAPHY WITH SUBBYTES MODIFICATION AND STEGANOGRAPHY BASED ON A WEBSITE

  • Muhammad Ilham Kurniawan Informatics, Engineering Faculty, Universitas Jenderal Soedirman, Indonesia
  • Eddy Maryanto Informatics, Engineering Faculty, Universitas Jenderal Soedirman, Indonesia
  • Swahesti Puspita Rahayu Informatics, Engineering Faculty, Universitas Jenderal Soedirman, Indonesia
Keywords: Advanced Encryption Standard, Least Significant Bit, SubBytes, S-box

Abstract

The Advanced Encryption Standard (AES) is a symmetric encryption algorithm commonly used to protect digital data. However, concerns about potential attacks on cryptographic keys and the development of cryptanalysis methods further reinforce the need for security enhancement. This study aims to combine two technologies: the Advanced Encryption Standard (AES) cryptography with modifications to the SubBytes, and steganography using the Least Significant Bit (LSB) method in images, to enhance the security level of encrypted messages in the context of transmission through websites. In this study, modifications were made to the AES algorithm by replacing the S-box in the SubBytes process with a perfect SAC S-box with an average SAC value of 0.5. This testing is divided into two types: algorithm testing and system testing. Algorithm testing involves performance testing methods that show longer decryption times with an average difference of 80.27 milliseconds, cryptanalysis testing showing increased ciphertext security based on cryptanalysis time estimates using brute force, and randomness testing to demonstrate improvements in Frequency and Poker tests. System testing using the Black Box method shows results that are valid as expected.

Downloads

Download data is not yet available.

References

N. Wachid Hidayatulloh, M. Tahir, H. Amalia, N. Afdlolul Basyar, A. F. Prianggara, and M. Yasin, “Mengenal Advance Encrytion Standard (AES) Sebagai Algoritma Kriptografi Dalam Mengamankan Data,” Digital Transformation Technology (Digitech) | e, vol. 3, no. 1, pp. 1–10, 2023, doi: 10.47709/digitech.v3i1.2293.

M. B. Aryanto, M. Tahir, S. I. Devita, Z. N. Mustofa, Q. Ainiyah, and S. Sundoro, “Implementasi Enkrip Dan Dekrip File Menggunakan Metode Advance Encryption Standard (AES-128),” JUISIK, vol. 3, no. 1, pp. 89–104, 2023, [Online]. Available: http://journal.sinov.id/index.php/juisik/indexHalamanUTAMAJurnal:https://journal.sinov.id/index.php

Rahmaniah, M. Firman Aditya, W. Arfanda, V. Ndika purnama, and Cicilia, “Studi Algoritma Kriptografi Kunci Simetris pada Keamanan Data dengan Metode Komparasi,” JURNAL SITEBA, vol. 2, no. 1, pp. 7–14, 2023, [Online]. Available: https://journal.iteba.ac.id/index.php/jurnalsiteba/index

Z. Arif and A. Nurokhman, “Analisis Perbandingan Algoritma Kriptografi Simetris Dan Asimetris Dalam Meningkatkan Keamanan Sistem Informasi Comparative Analysis of Symmetric and Asymmetric Cryptographic Algorithms in Improving Information System Security,” JTSI, vol. 4, no. 2, pp. 394–405, 2023.

Y. Putra, Y. Yuhandri, and S. Sumijan, “Meningkatkan Keamanan Web Menggunakan Algoritma Advanced Encryption Standard (AES) terhadap Seragan Cross Site Scripting,” Jurnal Sistim Informasi dan Teknologi, vol. 3, no. 2, pp. 56–63, Jun. 2021, doi: 10.37034/jsisfotek.v3i2.44.

M. Adharis Adlani and R. E. Putra, “Pengamanan Mnemonic Phrase Menggunakan Modified Advanced Encryption Standart,” Journal of Informatics and Computer Science, vol. 03, no. 4, pp. 425–434, 2022.

Siaulhak and S. Kasma, “Sistem Pengiriman File Menggunakan Steganografi Pengolahan Citra Digital Berbasis Matriks Laboratory,” BANDWIDTH: Journal of Informatics and Computer Engineering, vol. 01, no. 02, pp. 75–81, 2023.

F. Yanti and K. Budayawan, “Implementation Steganografi Menggunakan Metode Least Significant Bit (LSB) dalam Pengamanan Informasi pada Citra Digital,” Jurnal Vocational Teknik Elektronika dan Informatika, vol. 11, no. 1, pp. 63–70, 2023, [Online]. Available: http://ejournal.unp.ac.id/index.php/voteknika/index

A. A. Wahid, “Analisis Metode Waterfall Untuk Pengembangan Sistem Informasi,” Jurnal Ilmu-ilmu Informatika dan Manajemen STMIK , pp. 1–5, 2020, [Online]. Available: https://www.researchgate.net/publication/346397070

N. Angraini and Y. Suryanto, “MODIFICATION ADVANCED ENCRYPTION STANDARD (AES) ALGORITHM WITH PERFECT STRICT AVALANCHE CRITERION S-BOX,” Jurnal Teknik Informatika (Jutif), vol. 3, no. 4, pp. 897–906, Aug. 2022, doi: 10.20884/1.jutif.2022.3.4.352.

N. Maulida Surbakti et al., “Penggunaan Bahasa Pemrograman Python dalam Pembelajaran Kalkulus Fungsi Dua Variabel,” Algoritma : Jurnal Matematika, Ilmu pengetahuan Alam, Kebumian dan Angkasa, vol. 2, no. 3, pp. 98–107, 2024, doi: 10.62383/algoritma.v2i3.67.

Y. P. Pratama, W. Prastiwinarti, L. Ahmad, and Z. S. Mahmuda, “Perancangan Aplikasi Konversi RGB CMYK berbasis Python,” JOURNAL OF APPLIED ELECTRICAL ENGINEERING, vol. 7, no. 2, pp. 102–105, 2023.

M. Shakila, P. Akmal Aoulia, P. S. Harson, F. M. Kurniawan, and P. Rosyani, “Analasis Penerapan Python Dengan Perhitungan Pertidaksamaan,” NEWTON : Jurnal Matematika, Fisika, Algoritma dan Sains, vol. 1, no. 1, pp. 29–33, 2023, [Online]. Available: https://ojs.jurnalmahasiswa.com/ojs/index.php/newtoon

N. Cristy and F. Riandari, “Implementasi Metode Advanced Encryption Standard (AES 128 Bit) Untuk Mengamankan Data Keuangan,” JIKOMSI, vol. 4, no. 2, pp. 75–85, 2021.

K. Hasna, M. Defriani, and M. H. Totohendarto, “Redesign User Interface Dan User Experience Pada Website Eclinic Menggunakan Metode Design Thinking,” KLIK: Kajian Ilmiah Informatika dan Komputer, vol. 4, no. 1, pp. 84–92, 2023, doi: 10.30865/klik.v4i1.1072.

M. Azhari, J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” Jurnal Pendidikan Sains dan Komputer, vol. 2, no. 1, pp. 163–171, 2022, doi: 10.47709/jpsk.v2i1.1390.

A. Davy Wiranata and R. T. Aldisa, “Aplikasi Steganografi Menggunakan Least Significant Bit (LSB) dengan Enkripsi Caesar Chipper dan Rivest Code 4 (RC4) Menggunakan Bahasa Pemrograman JAVA,” Jurnal Teknologi Informasi dan Komunikasi), vol. 5, no. 3, p. 2021, 2021, doi: 10.35870/jti.

A. E. Setiawan and A. Pasaribu, “Penerapan Steganografi Pada Citra Digital Menggunakan Metode Least Significant Bit (LSB) Kombinasi RC4 Berbasis Mobile Android,” Aisyah Journal of Informatics and Electrical Engineering, vol. 2, no. 1, pp. 18–28, 2020, [Online]. Available: http://jti.aisyahuniversity.ac.id/index.php/AJIEE

Alamsyah, “A Novel Construction of Perfect Strict Avalanche Criterion S-box using Simple Irreducible Polynomials,” Scientific Journal of Informatics, vol. 7, no. 1, pp. 10–22, 2020, [Online]. Available: http://journal.unnes.ac.id/nju/index.php/sji

N. Rachmat and Samsuryadi, “Performance Analysis of 256-bit AES Encryption Algorithm on Android Smartphone,” J Phys Conf Ser, vol. 1196, no. 1, pp. 1–6, Apr. 2019, doi: 10.1088/1742-6596/1196/1/012049.

P. Kuntal, “Performance Analysis of AES, DES and Blowfish Cryptographic Algorithms on Small and Large Data Files,” International Journal of Information Technology (Singapore), vol. 11, no. 4, pp. 813–819, Dec. 2019, doi: 10.1007/s41870-018-0271-4.

M. Nursalman, E. P. Nugroho, and F. R. A. Nur, “Implementation of Rivest Chiper Cryptography (RC6) with One Time Password (OTP) and Two Central Facilities Protocol in Complaint Service System,” in Proceedings of the 7th Mathematics, Science, and Computer Science Education International Seminar, MSCEIS 2019, European Alliance for Innovation, 2020. doi: 10.4108/eai.12-10-2019.2296270.

H. R. Zagi and A. A. T. Maolood, “A New Key Generation to Greate Enhanced Security Version of AES Encryption Method,” Journal of College of Education, vol. 2, no. 1, pp. 1–16, 2021.

H. J. Ali, T. M. Jawad, and H. Zuhair, “Data Security Using Random Dynamic Salting and AES Based on Master-Slave Keys for Iraqi Dam Danagement Dystem,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 23, no. 2, pp. 1018–1029, Aug. 2021, doi: 10.11591/ijeecs.v23.i2.pp1018-1029.

Published
2024-10-25
How to Cite
[1]
M. I. Kurniawan, E. Maryanto, and S. P. Rahayu, “IMPLEMENTATION OF A COMBINATION OF ADVANCED ENCRYPTION STANDARD CRYPTOGRAPHY WITH SUBBYTES MODIFICATION AND STEGANOGRAPHY BASED ON A WEBSITE”, J. Tek. Inform. (JUTIF), vol. 5, no. 5, pp. 1375-1384, Oct. 2024.