Perancangan Kriptografi Block Cipher Menggunakan Pola Logo Media Sosial
DOI:
https://doi.org/10.30865/json.v2i2.2535Keywords:
Cryptography, Block Cipher, Correlation, Avalanche Effect, Social Media Logo PatternAbstract
In this research, 64-bit Block Cipher Cryptography was designed based on the Social Media Logo Pattern, this design aims to produce a new cryptographic system, and aims to secure data or information in the form of text. In designing cryptography using Social Media Patterns, correlation tests have been carried out 24 times so as to produce the best pattern sequence with an average correlation value of 0.014425413 with a 1-2-4-3 sequence pattern. After finding the best pattern, 10 rounds are carried out where in each cycle there are 4 processes consisting of 4 patterns for the plaintext process and 4 patterns for the key process, and accompanied by S-Box substitution in each process so that the avalanche effect has a significant increase. In this research, the avalanche effect test was also carried out. In each avalanche effect test, it shows that the S-Box has an effect on the encryption process because in each cycle it has an avalanche effect that reaches 50%. So it can be said that the ciphertext generated by block cipher cryptography based on the social media logo pattern has random output results so that it can be used to secure data or information in the form of text
References
A. K. Aziiz and M. A. I. Pakereng, “Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Batik Ceplok Yogyakarta,†J. Sist. dan Teknol. Inf., vol. 8, no. 1, p. 68, 2020, doi: 10.26418/justin.v8i1.37135.
J. D. No, K. Sidorejo, K. Salatiga, and J. Tengah, “Perancangan Kriptografi Block Cipher Berbasis Pola Tarian Denok Deblong,†no. 52, pp. 43–51, doi: 10.21460/jutei.2018.31.146.
P. B. T. Kumbara and M. A. I. Pakereng, “Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Permainan Tradisional Rangku Alu,†J. Tek. Inform. dan Sist. Inf., vol. 5, no. 2, pp. 189–200, 2019, doi: 10.28932/jutisi.v5i2.1714.
J. Diponegoro, “PADA DATA CITRA.â€
R. Munir, “Kriptografi.â€
D. T. Informatika, “Pengantar Kriptografi,†2004.
M. A. I. Pakereng, “Perancangan Kriptografi Block Cipher Berbasis Pola Bercocok Tanam Pada Game Harvest Moon Artikel Ilmiah,†no. 672013722, 2017.
A. N. Setiawan, A. D. Wowor, and M. A. I. Pakereng, “Perancangan Algoritma pada Kriptografi Block Cipher dengan Teknik Langkah Kuda Dalam Permainan Catur,†Tek. Inform. Fak. Teknol. Informasi, Univ. Kristen Satya Wacana, pp. 2–7, 2015.
M. A. I. Pakereng, “Perancangan Kriptografi Block Cipher Menggunakan Pola Kabel UTP Straight dan Cross Over Artikel Ilmiah,†no. November, 2016.
A. Ilmiah et al., “Perancangan Kriptografi Block Cipher Berbasis Pola Ikan Berenang,†no. November, 2016.
E. Juliansyah, M. T. Informatika, I. Pendahuluan, and R. L. Rivest, “Implementasi Algoritma Kriptografi Rc-6 Dalam,†vol. 16, pp. 267–269, 2017.
D. Andriani, “Perancangan Aplikasi Penyandian Teks Dengan Menggunakan Algoritma Chiper Block Chaining,†J. Tek. Inform. Unika St. Thomas, vol. 02, no. 338, pp. 14–23, 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).

