Analisis Dan Implementasi Algoritma Rivest Code-5 Pada Keamanan Data
DOI:
https://doi.org/10.54066/jptis-itb.v1i1.187Keywords:
cryptography, encryption, decryption, rc-5 algorithmAbstract
The RC-5 algorithm is an algorithm with the encryption method using the symmetric method and processing in the form of a cipher block, the same keywords are used for the encryption and decryption processes. The testing and analysis phase consists of a). Testing the execution time of the key generation process (set up key) b). Testing the success of the encryption and decryption process on the client-server integration method c). Testing the success of the encryption and decryption process using the file operation method d). Comparison of overhead/file size before and after passing through the system. The testing phase and execution time analysis are carried out when using the file operation method where the test will be divided into 3 parts, namely the execution time for the key setup process, the encryption process, and the decryption process. Testing the success of the encryption and decryption process on the client-server integration method is divided into 2 parts, namely testing the encryption process and the decryption process. In testing the encryption process, the characters that will be sent to the server will be encrypted first with a key to becoming a ciphertext in the form of integer data. The test results obtained are 1). The execution time for key generation (set up key) is very fast, around 9-10 ns. 2). In the encryption and decryption process, the execution time depends on the size of the plaintext file. The larger the plaintext file size, the longer the execution time. Where for a file with a size of 1 kb requires an execution time of 50.6 ms in the encryption process. 3). There is no difference between the size of the file before entering encryption and after decryption. Where for files with a size of 500 bytes before entering the encryption process, a file of 500 bytes will be generated from the decryption process.
References
Andrizal, “Algoritma Enkripsi Rivest Code 5 (Rc-5), ”Dept. Teknik Elektro Option Teknik Komputer Itb, 2008.
Aprizaldi. “Aplikasi Keamanan Data Berbasis Web Menggunakan Algoritma AES 128 Untuk Enkripsi dan Dekripsi Data”. Jurnal Teknik Informatika. 2022.
Bruce Schneier, Applied Cryptography : Protocols, Algorithms, and Source Code in C, 2nd Edition.
Budi Rahardjo,” Keamanan Sistem informasi Berbasis Internet”, PT Insan Komunikasi Indonesia, Bandung, 2002.
E. [5]Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab, Yogyakarta:Andi, 2015.
Hamdani, Suryawan, S.H., dan Septiarini, A. 2013. “Pengujian Algoritma Rivest Code 5 Untuk Enkripsi Struktur File Dokumen”. Prosiding STI 2013 Seminar Nasional Teknik Informatika, Prospek dan Tantangan Mobile Application. Juni 2013,Universitas Ahmad Dahlan.
Harni Kusniyati. “Penerapan Algoritma Rivert Code 4 Pada Aplikasi Kriptografi Dokumen”. Jurnal Petir. 2018
Kaliski, B.S Jr and Yin, Y.L. 1998. On the Security of the RC5 Encryption Algorithm RSA Laboratories Technical Report TR-602. RSA Laboratories, a division of RSA Data Security, Inc.
Rehman, S.U. 2012. “Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)”. International Journal of Computer Science Issues. Vol 9. No. 2. Issue 1 January 2012. page 96 - 101.
S.H. Suryawan, Hamdani, "Pengamanan Data File Dengan Menggunakan Algoritma Enkripsi Rivest Code 5 ," Jurnal Informatika Mulawarman , vol.8, no. 2, pp. 44-49, 2013.
T. Zebua and E. Ndruru, “PENGAMANAN CITRA DIGITAL BERDASARKAN MODIFIKASI ALGORITMA RC4,” J. Teknol. Infomasi dan Ilmu Komput., vol. 4, no. 4, pp. 275–282, 2017.
Widodo Arif Prabowo. “Penyandian File Word Berdasarkan Algoritma Rivest Code 5”. Jurnal Sains Komputer & Informatika. 2018.
H. Pandiangan, S. Sijabat "PERANCANGAN MEDIA PENGIRIMAN PESAN TEKS DENGAN PENYANDIAN PESAN MENGGUNAKAN ALGORITMA RC4 BERBASIS WEB ," Jurnal Matik Penusa , vol. Volume XIX, No. 1 , no. ISSN 2088-3943 , pp. 63-71, Juni 2016