Implementasi Metode Kriptografi dengan Menggunakan Algoritma RC4 dan Steganografi Least Significant Bit Dalam Mengamankan Data Berbasis Android
DOI:
https://doi.org/10.30865/mib.v6i2.3902Keywords:
Cryptography, RC4 Algorithm, Least Significant Bit Steganography Algorithm, Data Security, AndroidAbstract
Security is a protection or protecting something important from something unwanted or other things that are theft of data security techniques, there are several ways to provide protection, one of which is by inserting something data that you want to protect into other media, message security. secret by inserting a message into an image file or better known as steganography is a development of a cryptography, where cryptography itself is a data security technique that contains elements of data management or formulation before it becomes new data and the new data can only be read or opened. by a certain person who can know the pattern of managing the data. The security and confidentiality of a message is very important and must be maintained, the problem of data confidentiality in a company or institution is a major problem where a lot of data that is confidential is open or widespread, this is very detrimental to the company, in addition to data confidentiality The other factor is that data confidentiality is a continued asset for the company to continue to managers in other divisions which must be maintained and used by someone appointed. From these problems, a cryptographic method is needed where the algorithm used is RC4 and steganography is used using Least Significant Bit (LSB) as the method. The advantage of RC4 is that the data in the management of making cryptography is more structured and has a non-static pattern in which the creation of confidential data can be made quickly and safely, while the Least Significant Bit (LSB) method is a method of inserting binary data into an image that has a color image and in it can accommodate 6 bits for the message. The purpose of this research is to create a cryptographic application system that combines the Least Significant Bit (LSB) technique to secure an android-based dataReferences
S. Aripin and M. Syahrizal, “Pengaman File Video Menggunakan Algoritma Merkle Hellman Knapsack,†J. Media Inform. Budidarma, vol. 4, no. 2, p. 461, 2020, doi: 10.30865/mib.v4i2.2039.
K. Kirman, “Implementasi Algoritma Rc4 Untuk Proteksi File Mp3,†Pseudocode, vol. 5, no. 1, pp. 80–86, 2018, doi: 10.33369/pseudocode.5.1.80-86.
R. Nuari and N. Ratama, “Implementasi Algoritma Kriptografi AES (Advanced Encryption Standard) 128 Bit Untuk Pengamanan Dokumen Shipping,†J. Artif. Intell. Innov. Appl., vol. 1, no. 2, pp. 2716–1501, 2020, [Online]. Available: http://openjournal.unpam.ac.id/index.php/JOAIIA.
M. B. S. Junianto, H. Ardiansyah, and ..., “Analisa Dan Perancangan Sistem Informasi Pengaman Dokumen Dengan Metode Algoritma XOR dan AES Berbasis Web (Studi Kasus: Bimbingan Belajar Matriks Pamulang),†JOAIIA J. …, vol. 1, no. 2, pp. 61–66, 2020.
N. Ratama, M. Kom, M. Kom, and K. Kecerdasan, Konsep Kecerdasan Buatan Dengan Pemahaman Logika Fuzzy Dan Penerapan Aplikasi. Penerbit Uwais Inspirasi Indonesia, CV.
KPM, R. A. Ramadhani, and e D. LiceFrense, “K-Nears Neigbours Risa Helilintar , Risky Aswi Ramadhani Siti Rochana,†Python “Belajar Pemrograman Python Dasar,†vol. 84, no. December, pp. 487–492, 2013, [Online]. Available: http://www.ask-jansen.com/wp-content/uploads/2014/04/Kontroversi-Kalori-ebook.pdf%0Ahttp://ir.obihiro.ac.jp/dspace/handle/10322/3933.
M. Fauzan, E. Purnomo, W. A. Priyono, S. N. Sari, and A. Wulandari, “Sekuritas Jaringan Komunikasi Voice over Internet Protocol ( VoIP ),†vol. 6, no. 2, pp. 183–188, 2012.
I. P. A. Dharmaadi, A. M. Barmawi, G. B. S, F. Informatika, and I. T. Telkom, “Enkripsi Gambar Parsial dengan Kombinasi Metode Stream Cipher RC4 dan Chaotic Function,†pp. 1–8.
E. S. Astuti, B. Prihadmantyo, and M. E. Apriyani, “Implementasi Algoritma Kriptografi Rc4 Dan Metode Steganografi Audio 2Lsb Pada Sistem Keamanan Informasi,†J. Teknol. Inf. dan Terap., vol. 4, no. 2, pp. 67–74, 2019, doi: 10.25047/jtit.v4i2.61.
R. Mulyono and E. Z. Astuti, “Pengamanan Pesan Text Menggunakan Metode Steganografi Least Significant Bit dengan Media Digital Gambar,†Skripsi, Univ. Dian Nuswantoro, 2015.
K. Dedi Darwis, “Teknik Steganografi Untuk Penyembunyian Pesan Teks Menggunakan Algoritma End Of File,†2017.
N. Anwar, “Perancangan Steganografi Hidden Message Dengan Metode Least Significant Bit Insertion (Lsb) Berbasis Matlab,†J. Algoritm. Log. dan Komputasi, vol. 1, no. 1, pp. 25–30, 2018, doi: 10.30813/j-alu.v1i1.1107.
D. Rahardika and N. Ratama, “Implementasi Network Automation Untuk Konfigurasi Jaringan Baru Dengan Netmiko,†vol. 2, no. 3, pp. 190–200, 2021.
Munawaroh and N. Ratama, “Penerapan Teknologi Augmented Reality Pada Matakuliah Pengantar Teknologi Informasi Di Universitas Pamulang Berbasis Android,†Satin, vol. 5, no. 2, pp. 17–24, 2019.
D. Nurpala and Munawaroh, “Perancangan Sistem Aplikasi Bank Soal pada Ujian Online Berbasis WEB ( Studi Kasus : SMA NEGERI 1 CIBEBER ),†J. Artif. Intell. Innov. Appl., vol. 1, no. 2, pp. 51–55, 2020.
K. Li, R. G. Dewar, and R. J. Pooley, “Object-oriented analysis using natural language processing,†Linguist. Anal., 2005.
N. Ratama, “Implementasi Metode Fuzzy Tsukamoto Untuk Deteksi Dini Autisme Pada Balita Berbasis Android,†Vol. 3, No. 2, Pp. 129–139, 2020, [Online]. Available: Https://E-Journal.Stmiklombok.Ac.Id/Index.Php/Jire/Article/View/269.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).