Implementasi Metode Kriptografi dengan Menggunakan Algoritma RC4 dan Steganografi Least Significant Bit Dalam Mengamankan Data Berbasis Android

Authors

  • Niki Ratama Universitas Pamulang, Tangerang Selatan
  • Munawaroh Munawaroh Universitas Pamulang, Tangerang Selatan

DOI:

https://doi.org/10.30865/mib.v6i2.3902

Keywords:

Cryptography, RC4 Algorithm, Least Significant Bit Steganography Algorithm, Data Security, Android

Abstract

Security is a protection or protecting something important from something unwanted or other things that are theft of data security techniques, there are several ways to provide protection, one of which is by inserting something data that you want to protect into other media, message security. secret by inserting a message into an image file or better known as steganography is a development of a cryptography, where cryptography itself is a data security technique that contains elements of data management or formulation before it becomes new data and the new data can only be read or opened. by a certain person who can know the pattern of managing the data. The security and confidentiality of a message is very important and must be maintained, the problem of data confidentiality in a company or institution is a major problem where a lot of data that is confidential is open or widespread, this is very detrimental to the company, in addition to data confidentiality The other factor is that data confidentiality is a continued asset for the company to continue to managers in other divisions which must be maintained and used by someone appointed. From these problems, a cryptographic method is needed where the algorithm used is RC4 and steganography is used using Least Significant Bit (LSB) as the method. The advantage of RC4 is that the data in the management of making cryptography is more structured and has a non-static pattern in which the creation of confidential data can be made quickly and safely, while the Least Significant Bit (LSB) method is a method of inserting binary data into an image that has a color image and in it can accommodate 6 bits for the message. The purpose of this research is to create a cryptographic application system that combines the Least Significant Bit (LSB) technique to secure an android-based data

References

S. Aripin and M. Syahrizal, “Pengaman File Video Menggunakan Algoritma Merkle Hellman Knapsack,†J. Media Inform. Budidarma, vol. 4, no. 2, p. 461, 2020, doi: 10.30865/mib.v4i2.2039.

K. Kirman, “Implementasi Algoritma Rc4 Untuk Proteksi File Mp3,†Pseudocode, vol. 5, no. 1, pp. 80–86, 2018, doi: 10.33369/pseudocode.5.1.80-86.

R. Nuari and N. Ratama, “Implementasi Algoritma Kriptografi AES (Advanced Encryption Standard) 128 Bit Untuk Pengamanan Dokumen Shipping,†J. Artif. Intell. Innov. Appl., vol. 1, no. 2, pp. 2716–1501, 2020, [Online]. Available: http://openjournal.unpam.ac.id/index.php/JOAIIA.

M. B. S. Junianto, H. Ardiansyah, and ..., “Analisa Dan Perancangan Sistem Informasi Pengaman Dokumen Dengan Metode Algoritma XOR dan AES Berbasis Web (Studi Kasus: Bimbingan Belajar Matriks Pamulang),†JOAIIA J. …, vol. 1, no. 2, pp. 61–66, 2020.

N. Ratama, M. Kom, M. Kom, and K. Kecerdasan, Konsep Kecerdasan Buatan Dengan Pemahaman Logika Fuzzy Dan Penerapan Aplikasi. Penerbit Uwais Inspirasi Indonesia, CV.

KPM, R. A. Ramadhani, and e D. LiceFrense, “K-Nears Neigbours Risa Helilintar , Risky Aswi Ramadhani Siti Rochana,†Python “Belajar Pemrograman Python Dasar,†vol. 84, no. December, pp. 487–492, 2013, [Online]. Available: http://www.ask-jansen.com/wp-content/uploads/2014/04/Kontroversi-Kalori-ebook.pdf%0Ahttp://ir.obihiro.ac.jp/dspace/handle/10322/3933.

M. Fauzan, E. Purnomo, W. A. Priyono, S. N. Sari, and A. Wulandari, “Sekuritas Jaringan Komunikasi Voice over Internet Protocol ( VoIP ),†vol. 6, no. 2, pp. 183–188, 2012.

I. P. A. Dharmaadi, A. M. Barmawi, G. B. S, F. Informatika, and I. T. Telkom, “Enkripsi Gambar Parsial dengan Kombinasi Metode Stream Cipher RC4 dan Chaotic Function,†pp. 1–8.

E. S. Astuti, B. Prihadmantyo, and M. E. Apriyani, “Implementasi Algoritma Kriptografi Rc4 Dan Metode Steganografi Audio 2Lsb Pada Sistem Keamanan Informasi,†J. Teknol. Inf. dan Terap., vol. 4, no. 2, pp. 67–74, 2019, doi: 10.25047/jtit.v4i2.61.

R. Mulyono and E. Z. Astuti, “Pengamanan Pesan Text Menggunakan Metode Steganografi Least Significant Bit dengan Media Digital Gambar,†Skripsi, Univ. Dian Nuswantoro, 2015.

K. Dedi Darwis, “Teknik Steganografi Untuk Penyembunyian Pesan Teks Menggunakan Algoritma End Of File,†2017.

N. Anwar, “Perancangan Steganografi Hidden Message Dengan Metode Least Significant Bit Insertion (Lsb) Berbasis Matlab,†J. Algoritm. Log. dan Komputasi, vol. 1, no. 1, pp. 25–30, 2018, doi: 10.30813/j-alu.v1i1.1107.

D. Rahardika and N. Ratama, “Implementasi Network Automation Untuk Konfigurasi Jaringan Baru Dengan Netmiko,†vol. 2, no. 3, pp. 190–200, 2021.

Munawaroh and N. Ratama, “Penerapan Teknologi Augmented Reality Pada Matakuliah Pengantar Teknologi Informasi Di Universitas Pamulang Berbasis Android,†Satin, vol. 5, no. 2, pp. 17–24, 2019.

D. Nurpala and Munawaroh, “Perancangan Sistem Aplikasi Bank Soal pada Ujian Online Berbasis WEB ( Studi Kasus : SMA NEGERI 1 CIBEBER ),†J. Artif. Intell. Innov. Appl., vol. 1, no. 2, pp. 51–55, 2020.

K. Li, R. G. Dewar, and R. J. Pooley, “Object-oriented analysis using natural language processing,†Linguist. Anal., 2005.

N. Ratama, “Implementasi Metode Fuzzy Tsukamoto Untuk Deteksi Dini Autisme Pada Balita Berbasis Android,†Vol. 3, No. 2, Pp. 129–139, 2020, [Online]. Available: Https://E-Journal.Stmiklombok.Ac.Id/Index.Php/Jire/Article/View/269.

Downloads

Published

2022-04-25

Issue

Section

Articles