Peningkatan Keamanan Pengiriman Pesan Teks: Kombinasi Advanced Encryption Standard (AES) 128 dan Least Significant Bit (LSB)
Main Article Content
Abstract
Confidentiality in transfer the messages is an important thing to maintain. Increased security in transfer the messages can be improved using cryptography and steganography. This article aims to apply a combination of AES 128 cryptography and LSB steganography in an application, and measures the quality of the stego-image. In this article, the AES 128 algorithm is used for the encryption process of secret messages and the LSB algorithm for the process of inserting secret messages in the cover image. PSNR is used to measure the quality of the stego-image, by comparing the cover image and the stego-image. This research produces an application that can be used for the security of sending text messages by combining the AES 128 algorithm in the plaintext encryption and the LSB algorithm in the secret message insertion process. In term of measuring the quality of the stego-image, it was found that the character length of the secret message would have an impact on the MSE and PSNR values. This means, the longer the character of the secret message will affect the quality of the stego-image.
Article Details
How to Cite
Fatma, Y., Hafid, A., & Dani, H. O. (2020). Peningkatan Keamanan Pengiriman Pesan Teks: Kombinasi Advanced Encryption Standard (AES) 128 dan Least Significant Bit (LSB). JUSIFO (Jurnal Sistem Informasi), 6(2), 111-120. https://doi.org/10.19109/jusifo.v6i2.6746
Section
Articles
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
How to Cite
Fatma, Y., Hafid, A., & Dani, H. O. (2020). Peningkatan Keamanan Pengiriman Pesan Teks: Kombinasi Advanced Encryption Standard (AES) 128 dan Least Significant Bit (LSB). JUSIFO (Jurnal Sistem Informasi), 6(2), 111-120. https://doi.org/10.19109/jusifo.v6i2.6746
References
Abdel Wahab, O. F., Hussein, A. I., Hamed, H. F. A., Kelash, H. M., Khalaf, A. A. M., & Ali, H. M. (2019). Hiding Data in Images Using Steganography Techniques with Compression Algorithms. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1168–1175. https://doi.org/10.12928/TELKOMNIKA.V17I3.12230
Ansari, A. S., Mohammadi, M. S., & Parvez, M. T. (2020). a Multiple-format Steganography Algorithm for Color Images. IEEE Access, 8, 83926–83939. https://doi.org/10.1109/ACCESS.2020.2991130
Antonio, H. (2013). Studi Perbandingan Enkripsi Steganografi dengan Menggunakan Metode Least Significant Bit dan End of File. JUSTIN (Jurnal Sistem dan Teknologi Informasi), 1(2), 132–137.
Anwar, N., Munawwar, M., Abduh, M., & Santosa, N. B. (2018). Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2(3), 783–791. https://doi.org/10.29207/resti.v2i3.606
Bhaudhayana, G. W., & Widiartha, I. M. (2015). Implementasi Algoritma Kriptografi AES 256 dan Metode Steganografi LSB pada Gambar BITMAP. Jurnal Ilmu Komputer, 8(2), 15–25.
Darbani, A., AlyanNezhadi, M. M., & Forghani, M. (2019). A New Steganography Method for Embedding Message in JPEG Images. 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI), 617–621. https://doi.org/10.1109/KBEI.2019.8735054
Fatma, Y., Mukhtar, H., & Taufik, M. (2018). Implementasi Steganografi pada Teks Terenkripsi dengan Algoritma RSA Menggunakan Metode BPCS. Jurnal Fasilkom, 7(2), 260–265. https://doi.org/10.37859/jf.v7i2.783
Fatma, Y., & Wardoyo, R. (2017). Pembangkitan Kunci Simetri Menggunakan Gambar dan Single Layer Perceptron. Universitas Gadjah Mada.
Gunawan, C. E., & Fenando, F. (2018). Pengukuran Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) Studi Kasus di PUSTIPD UIN Raden Fatah Palembang. JUSIFO (Jurnal Sistem Informasi), 4(2), 121–132. https://doi.org/10.19109/JUSIFO.V4I2.4107
Kim, C., Shin, D., Yang, C.-N., Chen, Y.-C., & Wu, S.-Y. (2019). Data Hiding Using Sequential Hamming + K with M Overlapped Pixels. KSII Transactions on Internet and Information Systems, 13(12), 6159–6174. https://doi.org/10.3837/tiis.2019.12.020
Laurentinus, L., Pradana, H. A., Sylfania, D. Y., & Juniawan, F. P. (2020). Performance comparison of RSA and AES to SMS messages compression using Huffman algorithm. Jurnal Teknologi dan Sistem Komputer, 8(3), 171–177. https://doi.org/10.14710/jtsiskom.2020.13468
Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617–624. https://doi.org/10.1016/j.procs.2016.02.108
Putra, R. A. (2019). Tantangan Media Massa Dalam Menghadapi Era Disrupsi Teknologi Informasi. JUSIFO (Jurnal Sistem Informasi), 5(1), 1–6. https://doi.org/10.19109/jusifo.v5i1.5003
Susanto, A., & Mulyono, I. U. W. (2020). Kombinasi LSB-RSA untuk Peningkatan Imperceptibility pada Kripto-Stegano Gambar RGB. Proceeding SENDIU 2020, July, 21–27.
Widyawati, L. (2019). Implementasi Metode Steganografi SLT-DCT pada Citra untuk Meningkatkan Kualitas Citra Steganografi.
Ansari, A. S., Mohammadi, M. S., & Parvez, M. T. (2020). a Multiple-format Steganography Algorithm for Color Images. IEEE Access, 8, 83926–83939. https://doi.org/10.1109/ACCESS.2020.2991130
Antonio, H. (2013). Studi Perbandingan Enkripsi Steganografi dengan Menggunakan Metode Least Significant Bit dan End of File. JUSTIN (Jurnal Sistem dan Teknologi Informasi), 1(2), 132–137.
Anwar, N., Munawwar, M., Abduh, M., & Santosa, N. B. (2018). Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2(3), 783–791. https://doi.org/10.29207/resti.v2i3.606
Bhaudhayana, G. W., & Widiartha, I. M. (2015). Implementasi Algoritma Kriptografi AES 256 dan Metode Steganografi LSB pada Gambar BITMAP. Jurnal Ilmu Komputer, 8(2), 15–25.
Darbani, A., AlyanNezhadi, M. M., & Forghani, M. (2019). A New Steganography Method for Embedding Message in JPEG Images. 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI), 617–621. https://doi.org/10.1109/KBEI.2019.8735054
Fatma, Y., Mukhtar, H., & Taufik, M. (2018). Implementasi Steganografi pada Teks Terenkripsi dengan Algoritma RSA Menggunakan Metode BPCS. Jurnal Fasilkom, 7(2), 260–265. https://doi.org/10.37859/jf.v7i2.783
Fatma, Y., & Wardoyo, R. (2017). Pembangkitan Kunci Simetri Menggunakan Gambar dan Single Layer Perceptron. Universitas Gadjah Mada.
Gunawan, C. E., & Fenando, F. (2018). Pengukuran Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) Studi Kasus di PUSTIPD UIN Raden Fatah Palembang. JUSIFO (Jurnal Sistem Informasi), 4(2), 121–132. https://doi.org/10.19109/JUSIFO.V4I2.4107
Kim, C., Shin, D., Yang, C.-N., Chen, Y.-C., & Wu, S.-Y. (2019). Data Hiding Using Sequential Hamming + K with M Overlapped Pixels. KSII Transactions on Internet and Information Systems, 13(12), 6159–6174. https://doi.org/10.3837/tiis.2019.12.020
Laurentinus, L., Pradana, H. A., Sylfania, D. Y., & Juniawan, F. P. (2020). Performance comparison of RSA and AES to SMS messages compression using Huffman algorithm. Jurnal Teknologi dan Sistem Komputer, 8(3), 171–177. https://doi.org/10.14710/jtsiskom.2020.13468
Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617–624. https://doi.org/10.1016/j.procs.2016.02.108
Putra, R. A. (2019). Tantangan Media Massa Dalam Menghadapi Era Disrupsi Teknologi Informasi. JUSIFO (Jurnal Sistem Informasi), 5(1), 1–6. https://doi.org/10.19109/jusifo.v5i1.5003
Susanto, A., & Mulyono, I. U. W. (2020). Kombinasi LSB-RSA untuk Peningkatan Imperceptibility pada Kripto-Stegano Gambar RGB. Proceeding SENDIU 2020, July, 21–27.
Widyawati, L. (2019). Implementasi Metode Steganografi SLT-DCT pada Citra untuk Meningkatkan Kualitas Citra Steganografi.