DESIGNING 64-BIT BLOCK CIPHER CRYPTOGRAPHY BASED ON THE PATTERN OF ONE OF KARO'S TRADITIONAL CLOTHS
Abstract
The ease of access to information technology in the modern era can be felt in various aspects of human life needs, one of which is exchanging information or exchanging data is an activity that has been carried out very often every day. With this convenience, the security and confidentiality of the data is also very important to consider because the information or data exchanged can contain important or confidential matters. In the exchange of data or information, of course, a security system is needed that ensures the data remains safe. One of the techniques to secure this data is to use cryptographic techniques. There have been many cryptographic techniques used or implemented to secure information, but many cryptographic techniques have been solved so that the ability to secure data is doubtful. One way to overcome this is to create a new cryptography or make changes to existing cryptography. Through this research, a cryptography will be created that uses the pattern of Karo traditional cloth and uses a 64-bit Block Cipher to produce a better encryption process.
Downloads
References
N. C. Anam, “Perancangan Kriptografi Block Cipher 64 Bit Berbasis Pola Permainan Tradisional Bentengan Jawa Barat,” JUTEI, vol. 3, no. 1, pp. 65–73, 2019, doi: 10.21460/jutei.2018.31.145.
A. H. Alwan and A. H. Kashmar, “Block Ciphers Analysis Based on a Fully Connected Neural Network,” IHJPAS: Ibn Al-Haitham Journal For Pure and Applied Sciences, vol. 36, no. 1, pp. 415–427, Jan. 2023, doi: 10.30526/36.1.3058.
P. B. T. Kumbara and M. A. I. Pakereng, “Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Permainan Tradisional Rangku Alu,” JuTISI: Jurnal Teknik Informatika dan Sistem Informasi, vol. 5, no. 2, pp. 189–200, Sep. 2019, doi: 10.28932/jutisi.v5i2.1714.
C. De Cannière, A. Biryukov, and B. Preneel, “An Introduction to Block Cipher Cryptanalysis,” in Proceedings of the IEEE, Institute of Electrical and Electronics Engineers Inc., 2006, pp. 346–355. doi: 10.1109/JPROC.2005.862300.
R. R. Fauzi and W. Theophilus, “Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice,” AITI: Jurnal Teknologi Informasi, vol. 18, no. 1, pp. 158–172, 2021.
D. J. E. Prihanto and M. A. I. Pakereng, “Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Tarian Sajojo Papua,” ULTIMA Computing, vol. 11, no. 2, pp. 71–80, 2019.
A. K. Aziiz and M. A. I. Pakereng, “Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Batik Ceplok Yogyakarta,” Justin: Jurnal Sistem dan Teknologi Informas, vol. 8, no. 1, pp. 68–77, 2020.
K. D. Cahyono and E. Mailoa, “Perancangan Kriptografi Block Cipher dengan Langkah Permainan Engklek,” Salatiga , 2016.
T. Thiranadya, M. Bulamey, and Hendry, “Perancangan Kriptografi Block Cipher Menggunakan Pola Logo Media Sosial,” JSON: Jurnal Sistem Komputer dan Informatika , vol. 2, no. 2, pp. 115–122, 2021, doi: 10.30865/json.v2i2.2535.
A. Gupta and N. K. Walia, “Cryptography Algorithms: A Review,” IJEDR: International Journal of Engineering Development and Research, vol. 2, no. 2, pp. 1667–1673, 2014, [Online]. Available: www.ijedr.org
D. D. Bili, M. A. I. Pakereng, and A. D. Wowor, “Perancangan Kriptografi Block Cipher dengan Langkah Kuda,” Salatiga, 2015.
Warkim, I. Lewenusa, and P. K. Karo, “Kriptografi Algoritma Advanced Encryption Standard dan Pengecekan Error Detection Cyclic Redundacy Check,” Jurnal FTI UNTAR, 2015, [Online]. Available: http://fti.tarumanagara.ac.id/jurnal/index.php/jki
S. D. Bramantya and M. A. I. Pakereng, “Perancangan Kriptografi Blok Cipher Berbasis Pola Gambar RUmah Adat Joglo,” JTIK: Jurnal Teknologi Teknologi Informasi dan Komunikasi, vol. 7, no. 4, pp. 629–638, 2023.
Edo, H. Nasution, and M. A. Irwansyah, “Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Peta Administrasi Kalimantan Barat Menggunakan Key-Dependent S-Box,” JIP: Jurnal Informatika Polinema, vol. 10, no. 3, pp. 323–332, 2024.
M. Afsari, D. I. Mulyana, A. Damaiyanti, and N. Sa’adah, “Implementasi Mode Operasi Kombinasi Cipher Block Chaining dan Metode LSB-1 Pada Pengamanan Data text,” Jurnal Pendidikan Sains dan Komputer, vol. 2, no. 1, pp. 70–82, 2022, doi: 10.47709/jpsk.v2i1.1381.
H. Khair, J. D. M Saragih, and A. M. H. Pardede, “Pengamanan Data Teks Menggunakan Algoritma Modular Multiplication Based Block Chiper,” Information System Development, vol. 6, no. 1, pp. 10–16, 2021.
Copyright (c) 2024 Dandy Duggari Manik, Ramos Somya
This work is licensed under a Creative Commons Attribution 4.0 International License.