Peningkatan Keamanan Pengiriman Pesan Teks: Kombinasi Advanced Encryption Standard (AES) 128 dan Least Significant Bit (LSB)

Main Article Content

Yulia Fatma Afdhil Hafid Heru Oktavian Dani

Abstract

Confidentiality in transfer the messages is an important thing to maintain. Increased security in transfer the messages can be improved using cryptography and steganography. This article aims to apply a combination of AES 128 cryptography and LSB steganography in an application, and measures the quality of the stego-image. In this article, the AES 128 algorithm is used for the encryption process of secret messages and the LSB algorithm for the process of inserting secret messages in the cover image. PSNR is used to measure the quality of the stego-image, by comparing the cover image and the stego-image. This research produces an application that can be used for the security of sending text messages by combining the AES 128 algorithm in the plaintext encryption and the LSB algorithm in the secret message insertion process. In term of measuring the quality of the stego-image, it was found that the character length of the secret message would have an impact on the MSE and PSNR values. This means, the longer the character of the secret message will affect the quality of the stego-image.

Article Details

How to Cite
Fatma, Y., Hafid, A., & Dani, H. (2020). Peningkatan Keamanan Pengiriman Pesan Teks: Kombinasi Advanced Encryption Standard (AES) 128 dan Least Significant Bit (LSB). JUSIFO (Jurnal Sistem Informasi), 6(2), 111-120. https://doi.org/https://doi.org/10.19109/jusifo.v6i2.6746
Section
Artikel

References

Abdel Wahab, O. F., Hussein, A. I., Hamed, H. F. A., Kelash, H. M., Khalaf, A. A. M., & Ali, H. M. (2019). Hiding Data in Images Using Steganography Techniques with Compression Algorithms. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1168–1175. https://doi.org/10.12928/TELKOMNIKA.V17I3.12230

Ansari, A. S., Mohammadi, M. S., & Parvez, M. T. (2020). a Multiple-format Steganography Algorithm for Color Images. IEEE Access, 8, 83926–83939. https://doi.org/10.1109/ACCESS.2020.2991130

Antonio, H. (2013). Studi Perbandingan Enkripsi Steganografi dengan Menggunakan Metode Least Significant Bit dan End of File. JUSTIN (Jurnal Sistem dan Teknologi Informasi), 1(2), 132–137.

Anwar, N., Munawwar, M., Abduh, M., & Santosa, N. B. (2018). Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2(3), 783–791. https://doi.org/10.29207/resti.v2i3.606

Bhaudhayana, G. W., & Widiartha, I. M. (2015). Implementasi Algoritma Kriptografi AES 256 dan Metode Steganografi LSB pada Gambar BITMAP. Jurnal Ilmu Komputer, 8(2), 15–25.

Darbani, A., AlyanNezhadi, M. M., & Forghani, M. (2019). A New Steganography Method for Embedding Message in JPEG Images. 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI), 617–621. https://doi.org/10.1109/KBEI.2019.8735054

Fatma, Y., Mukhtar, H., & Taufik, M. (2018). Implementasi Steganografi pada Teks Terenkripsi dengan Algoritma RSA Menggunakan Metode BPCS. Jurnal Fasilkom, 7(2), 260–265. https://doi.org/10.37859/jf.v7i2.783

Fatma, Y., & Wardoyo, R. (2017). Pembangkitan Kunci Simetri Menggunakan Gambar dan Single Layer Perceptron. Universitas Gadjah Mada.

Gunawan, C. E., & Fenando, F. (2018). Pengukuran Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) Studi Kasus di PUSTIPD UIN Raden Fatah Palembang. JUSIFO (Jurnal Sistem Informasi), 4(2), 121–132. https://doi.org/10.19109/JUSIFO.V4I2.4107

Kim, C., Shin, D., Yang, C.-N., Chen, Y.-C., & Wu, S.-Y. (2019). Data Hiding Using Sequential Hamming + K with M Overlapped Pixels. KSII Transactions on Internet and Information Systems, 13(12), 6159–6174. https://doi.org/10.3837/tiis.2019.12.020

Laurentinus, L., Pradana, H. A., Sylfania, D. Y., & Juniawan, F. P. (2020). Performance comparison of RSA and AES to SMS messages compression using Huffman algorithm. Jurnal Teknologi dan Sistem Komputer, 8(3), 171–177. https://doi.org/10.14710/jtsiskom.2020.13468

Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617–624. https://doi.org/10.1016/j.procs.2016.02.108

Putra, R. A. (2019). Tantangan Media Massa Dalam Menghadapi Era Disrupsi Teknologi Informasi. JUSIFO (Jurnal Sistem Informasi), 5(1), 1–6. https://doi.org/10.19109/jusifo.v5i1.5003

Susanto, A., & Mulyono, I. U. W. (2020). Kombinasi LSB-RSA untuk Peningkatan Imperceptibility pada Kripto-Stegano Gambar RGB. Proceeding SENDIU 2020, July, 21–27.

Widyawati, L. (2019). Implementasi Metode Steganografi SLT-DCT pada Citra untuk Meningkatkan Kualitas Citra Steganografi.