Penerapan Algoritma Coupled Linear Congurential Generator (CLCG) pada Algoritma Kriptografi One Time Pad (OTP) dalam Proses Mengamankan Pesan
DOI:
https://doi.org/10.30865/mib.v4i3.2244Keywords:
Message, Cryptographi, One Time Pad (OTP), Coupled Linear Congruential Generator (CLCG), Periodic TablesAbstract
Message is an idea, feeling, or thought of someone whose contents can be in the form of science, entertainment, information, advice, or propaganda. Nowadays, with the development of very advanced technology, one can exchange messages so easily and quickly without any limitations on distance and time. However, with the ease of exchanging messages there are problems that can occur, one of which is the message you want to send opens opportunities for people who want to steal data and information from the message to use it as a crime and will certainly harm certain parties. Therefore, the technique of securing messages is used by using the OTP algorithm and the CLCG random number generator so that messages sent to the security level can be guaranteed. The results of the merging of the OTP and CLCG algorithms in the encryption and decryption process found random key generator does not occur the same key loop with the same characters adjacent to the message. The use of periodic tables in the encryption process also increases the difficulty of deciphering messages because one plaintext character is replaced by many characters in the ciphertextReferences
A. Liliwer, Komunikasi Serba Ada Serba Makna, Kencana, 2010.
S. M. Suryanto, Pengantar Ilmu Komunikasi, Bandung: CV. Pustaka Setia, 2015.
R. Aulia, “Pemanfaatan Website Sebagai Sarana Managing Data Dalam Suatu Organisasi (Studi Kasus: Pertemuan Ilmiah Nasional (Pin) Perhimpunan Dokter Spesialis Saraf Indonesia (Perdossi) 2013 Medan),†InfoTekJar: Jurnal Nasional Informatika dan Teknolologi Jaringan, vol. I, no. 1, pp. 1-6, 2016.
P. Utomo, Sapriadi dan M. Zarlis, “Algoritma Split-Merge One Time Pad Dalam Peningkatan Enkripsi Data,†dalam Seminar Nasional Teknologi Informatika (SEMANTIKA), 2017.
E. H. Houssein, A. A. Mona dan A. E. Hassanien, “An image steganography algorithm using haar discrete wavelet transform with advanced encryption system,†dalam Federated Conference on Computer Science and Information Systems (FedCSIS)., 2016.
E. H. Rachmawanto dan C. A. Sari, “A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size,†dalam International Seminar on Application for Technology of Information and Communication (iSemantic), 2017.
H. A. Elsayed, Y. K. Jadaan dan S. K. Guirguis, “Image security using quantum Rivest-Shamir-Adleman cryptosystem algorithm and digital watermarking.,†dalam Progress in Electromagnetic Research Symposium (PIERS)., 2016.
D. Ariyus, Kriptografi Keamanan Data dan Komunikasi, Yogyakarta: Graha Ilmu, 2006.
I. Wibowo, Susanto dan J. Karel, “Penerapan Algoritma Kriptografi Asimetris RSA untuk Keamanan Data di Oracle,†Jurnal Informatika, vol. 1, no. 5, 2011.
Saha, B. Jyoti, K. K. Kabi dan C. Pradhan, “Non blind watermarking technique using enhanced one time pad in DWT domain,†dalam Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2014.
J. Clawdia, N. Khairina dan M. K. Harahap, “Implementasi Algoritma Kriptografi One Time Pad (OTP) Dengan Dynamic Key Linear Congruential Generator (LCG),†dalam KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), 2017.
K. B. Boateng dan A. H. Lashkari, “Securing GOOSE : The Return of One-Time Pads,†dalam International Carnahan Conference on Security Technology (ICCST), Chennai, 2019.
N. Khairina, M. K. Harahap, A. M. Husein, Muhathir dan R. Muliono, “Secure Data Encryption Through Combination of RSA Cryptography Random Key Algorithm and Quadratic Congruential Generator,†dalam Journal of Physics: Conference Series, 2019.
R. Aulia, A. Zakir dan M. Zulhafiz, “Penerapan Algoritma One Time Pad & Linear Congruential Generator Untuk Keamanan Pesan Teks,†InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan, vol. 4, no. 1, 2019.
Sugiyono, Metode Penelitian Kuantitatif, Kualitatif, dan Kombinasi, Bandung: Alfa Beta, 2012.
J. E. kaufmann dan K. L. Schwitters, Algebra for college students., Cengage Learning, 2014.
I. M. D. Biantara, I. M. Sudana, A. F. Suni, Suyono dan A. Hangga, “Modifikasi Metode Linear Congruential Generator Untuk Optimalisasi Hasil Acak.,†dalam Seminar Nasional Informatika (SEMNASIF), Yogyakarta, 2015.
E. H. Rachmawanto dan C. A. Sari, “Secure image steganography algorithm based on dct with otp encryption.,†Journal of Applied Intelligent System, vol. II, no. 1, pp. 1-11, 2017.
O. Tornea, M. E. Borda, V. Pileczki dan R. Malutan, “DNA Vernam cipher.",†dalam E-Health and Bioengineering Conference (EHB), 2011.
C. A. Sari dan E. H. Rachmawanto, “Gabungan Algoritma Vernam Chiper dan End of File Untuk Keamanan Data.,†Jurnal Teknologi Informasi, vol. XIII, no. 3, pp. 150-157, 2014.
R. Shukla, H. O. Prakash, R. P. Bhushan, S. Venkataraman dan G. Varadan, “Sampurna Suraksha: unconditionally secure and authenticated one time pad cryptosystem.,†dalam International Conference on Machine Intelligence and Research Advancement, India, 2013.
D. R. I. M. Setiadi, E. H. Rachmawanto dan C. A. Sari, “Implementasi One Time Pad Kriptografi Pada Gambar Grayscale Dan Gambar Berwarna.,†dalam Proceeding SENDI_U, Semarang, 2017.
R. Chang, Kimia Dasar : Konsep - Konsep Inti, Jakarta: Erlangga, 2005.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).