ANALISIS PERFORMA KRIPTOGRAFI HYBRID ALGORITMA BLOWFISH DAN ALGORITMA RSA

Sebastian Suhandinata, Reyhan Achmad Rizal, Dedy Ongky Wijaya, Prabhu Warren, Srinjiwi Srinjiwi

Abstract


Abstract:Computer data security relies on preventing data theft from irresponsible parties by using cryptography method. Some cryptography algorithms have good and poor performance in encrypting and decrypting data depending on the key types. Therefore the purpose of this research is to measure the performance of the hybrid algorithm, consisting a symmetric keyBlowfish algorithm and an asymmetric key RSA algorithm, in encrypting and decrypting multiple types of data such as documents, photos, audios, and videos. The result is the performance of the hybrid algorithm is almost on par with Blowfish and provides a more secure data encryption and decryption by taking advantage of RSA algorithm. The average encryption performance of hybrid algorithm is 0.85s on document, 1.06s on photo, 3.38s on audio, and 15.56s on video. While the average decryption performance of hybrid algorithm is 1.01s on document, 1.38s on photo, 4.3s on audio, and 27.56s on video.

           
Keywords:Hybrid cryptography, Data security, Performance, Blowfish, RSA

 

 

Abstrak:Keamanan data komputer berhubungan dengan pencegahan dari pencurian data oleh pihak yang tidak bertanggung jawab, salah satu cara pengamanan data komputer yaitu dengan teknik kriptografi. Beberapa metode kriptografi memiliki performa yang baik dan buruk tergantung dengan tipe kuncinya. Maka dari itu, tujuan dari penelitian ini adalah mengukur tingkat kecepatan kriptografi hybrid, terdiri dari algoritma simetris Blowfish dan algoritma asimetris RSA, dengan beberapa tipe data seperti dokumen, foto, audio dan video. Hasil dari penelitian ini adalah algoritma hybrid memiliki performa yang tidak jauh berbeda dari algoritma Blowfish dan membuat proses enkripsi dan dekripsi data lebih aman dengan keunggulan dari algoritma RSA. Rata-rata kecepatan enkripsi algoritma hybrid untuk dokumen 0,85 detik, gambar 1,06 detik, audio 3,38 detik, dan video 15,56 detik. Sedangkan rata-rata kecepatan dekripsi algoritma hybrid untuk dokumen 1,01 detik, gambar 1,38 detik, audio 4,3 detik, dan video 27,56 detik.

 

Kata kunci:Kriptografihybrid, Keamanan data, Performa, Blowfish, RSA

 


Full Text:

PDF

References


R. Hardi and Z. , "Implementasi Sistem Keamanan Komputer Menggunakan Sistem Terintegrasi Client Server Metode Service Oriented Architecture (SOA)," Jurnal Teknologi Terpadu Vol. 6 No. 1, pp. 1-7, 2018.

D. Ariyus, Pengantar Ilmu Kriptografi: Teori, Analisis & Implementasi, Yogyakarta: C.V Andi Offset, 2008.

C. A. Sari, E. H. Rachmawanto, D. W. Utomo and R. R. Sani, "Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher Dan Bit Shiffting," Journal of Applied Intelligent System Vol. 1 No. 3, pp. 179-190, 2016.

S. Sitinjak, Y. Fauziah and J. , "Aplikasi Kriptografi File Menggunakan Algoritma Blowfish," Seminar Nasional Informatika 2010, pp. 78-86, 2010.

R. Y. Rifai, Y. Chirstyono and I. Santoso, "Implementasi Algoritma Kriptografi Rivest Code 4, Rivest Shamir Adleman Dan Metode Steganografi Untuk Pengamanan Pesan Rahasia Pada Berkas Teks Digital," Transient Vol. 5 No. 1, pp. 86-91, 2016.

B. Prasetiyo, R. Gernowo and B. Noranita, "Kombinasi Steganografi Berbasis Bit Matching Dan Kriptografi DES Untuk Pengamanan Data," Scientific Journal of Informatics Vol. 1 No. 1, pp. 79-94, 2014

M. Mulya, "Perbandingan Kecepatan Algoritma Kriptografi Asimetri," Journal of Research in Computer Science and Applications Vol. 1 No. 2, pp. 7-12, 2013.

T. Andriyanto and D. L. C. Pardede, "Studi Dan Perbandingan Algoritma IDEA Dan Algoritma Blowfish," Seminar Ilmiah Nasional Komputer dan Sistem Intelijen 2008, pp. 182-189, 2008.

R. Tripathi and S. Agrawal, "Comparative Study Of Symmetric And Asymmetric Cryptography Techniques," International Journal of Advance Foundation and Research in Computer Vol. 1 Issue 6, pp. 68-76, 2014.

S. Singh and A. Singh, "An Information Security Technique Using DES-RSA Hybrid And LSB," International Journal of Emerging Technologies in Computational and Applied Sciences, pp. 187-192, 2014.

A. Pandey and P. Bonde, "Performance Evaluation Of Various Cryptography Algorithms Along With LSB Substitution Technique," International Journal of Engineering Research & Technology Vol. 2 Issue 6, pp. 866-871, 2013.

A. L. Jeeva, V. Palanisamy and K. Kanagaram, "Comparative Analysis Of Performance Efficiency And Security Measures Of Some Encryption Algorithms," International Journal of Engineering Research and Applications Vol. 2 Issue 3, pp. 3033-3037, 2012.

R. P. S and V. Paul, "A Hybrid Crypto System Based On A New Cicle-Symmetric Key Algorithm And RSA With CRT Asymmetric Key Algorithm For E-commerce Application," International Journal of Computer Applications, pp. 14-18, 2011.

A. Alabaichi, F. Ahmad and R. Mahmod, "Security Analysis Of Blowfish Algorithm," International Conference on Informatics & Applications, pp. 12-18, 2013.

Z. Arifin, "Studi Kasus Penggunaan Algoritma RSA Sebagai Algoritma Kriptografi Yang Aman," Jurnal Informatika Mulawarman Vol. 4 No. 3, pp. 7-14, 2009.

P. Kalpana and S. Singaraju, "Data Security in Cloud Computing Using RSA Algorithm," International Journal of Research in Computer & Communication Technology Vol. 1 Issue 4, pp. 143-146, 2012.




DOI: https://doi.org/10.33330/jurteksi.v6i1.395

Article Metrics

Abstract view : 758 times
PDF - 668 times

Refbacks

  • There are currently no refbacks.


Lisensi Creative Commons
Ciptaan disebarluaskan di bawah Lisensi Creative Commons Atribusi-BerbagiSerupa 4.0 Internasional.