KRIPTOGRAFI HYBRIDA MENGGUNAKAN ALGORITMA HILL CIPHER DAN ALGORITMA RSA UNTUK KEAMANAN PENGIRIMAN INFORMASI PADA EMAIL
DOI:
https://doi.org/10.30865/komik.v1i1.464Abstract
This research aims to analyze the performance of the algorithm that can improve the security message with a hybrid cryptosystem using algorithm hill cipher and RSA asymmetric key with a key so that the size of file after the encrypted small time for process encryption and decryption fast. The algorithm used is a modification algorithms Hill Cipher. This research uses hybrid cryptosystem, which message is hidden by using hill cipher and the key is hidden by using RSA algorithm. The results of this research is that a better message security by making the hybrid cryptosystem using fingerprint image of sender as a key that will be secured because the encryption key is not equal tothe decryption key. Besides it is very difficult to guess the key figures for the sum of characters that is sent to the recipient's key is not equal to the actual number of key characters. The time is used to decrypt the ciphertext with hybrid hill cipher and RSA algorithm for the number of characters and fingerprint image with the same threshold value turned out to be longer than the time that is used to decrypt the cipher text with hill cipher algorithm. The sum of characters (size of file) after encrypted and decrypted same. This is because the use of modulo 256 in the calculation of the encryption so the limit of character after encrypted and decrypted between 0 to 255. Each character encrypted will be 1 ASCII character as well.References
Anton, H & Rosses, C.2010. Elementary Linear Algebra Aplication Version 10th Edition. John Wiley & Sons, Inc.
Dooley, J.F. 2013. A Brief History of Cryptology and Cryptographic Algorithms. Springer Brief in Computer Science. ISBN 978-3-319-01628-3 99.
Gupta,R.K. and Singh,P. 2013. A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network. International Journal of Emerging Technology and Advanced Engineering ISSN 2250-2459. (online) http://www.ijetae.com
Hoffstein,J., Pipher,J. and Silverman.J.H. (Editors) .2008. An Introduction Of Mathematical Cryptography. Springer Science + Business Media .e-ISBN: 9780-387-77994-2.
Iyer, S.C., Sedamkar, R.R., Gupta, S., 2016. A Novel Idea on Multimedia Encryption using Hybrid Crypto Approach. 7th International Conference on Communication, Computing and Virtualization 2016 : pp. 293-298. Elsevier.
Kim, S. And Leeb, G. 2013. Secure Verifiable Noninteractive Oblivious Transfer Protocol Using RSA and Bit Commitment on Distributed Environment. Elsevier.
Mahajan, S. & Singh, M. 2014. Performance Analysis of Efficient RSA Text Encryption Using NVIDIA CUDA-C and OpenCL. Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing - ICONIAAC '14 ISBN: 978-1-4503-2908-8 31:1-6.
Meng, X. & Zheng, X. 2015. Cryptanalysis Of RSA With A Small Parameter Revisited. Information Processing Letters 115: 858–862. (online) http://www.elsevier.com/locate/ipl.
Mollin, R. A. 2007. An Introduction to Cryptography - 2nd edition. Chapman and Hall / CRC Paar, J., Pelzl, J., Preenel, B. (Editors). 2010. Understanding Cryptography. Springer : New York. Palanisamy, V. & Jeneba, M. A. 2011. Hybrid Cryptography By The Implementation Of RSA And AES, International Journal of Current Research Vol. 33, Issue, 4, pp.241-244. ISSN: 0975-833X. Reddy, K.A. 2012. A Modified Hill Cipher Based on Circulant Matrices. Elsevier Procedia Technology 4 : 114 – 118. Shahram, K. & Siavash, A. 2016. Ciphertext-only attack on d ×d Hill in O(d13d). Information Processing Letters 118 : 25–29. (online) http://www.elsevier.com/locate/ipl. Schneier, B.1996. Applied Cryptography 2nd edition, Protocols,Algorithms,and Source Code in C. ISBN13: 978-1-119-09672-6 Amazon. Seth, S. M. & Mishra R. 2011. Comparative Analysis of Encryption Algorithms for Data Communication, International Journal of Computer Science and Technology, Vol. 2. ISSN : 2229-4333 . Solomon, M.G.& Chapple, M. 2004. Information Security Illuminated. Jones and Bartlett Publishers : Canada. Stallings, William. 2003. Cryptography and Network Security. Prentice Hall. Thao, J. 2014. RSA visual: A Visualization Tool for the RSA Cipher . Proceedings of the ACM National Science Foundation under grants DUE-1140512, DUE-1245310 and IIS-1319363. Department of Computer Science Michigan Technological University Houghton, MI. USA. Tyagi, N. et al 2017. Hybrid Key Cryptography: A Tool for Security. International Journal of Innovative Research in Science,Engineering and Technology. Vol. 6, Issue 3. ISSN (Print) : 2347-6710. (online) www.ijirset.com. ISSN(Online) : 2319-8753..

