PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY

Lanny Sutanto, Gregorius Satia Budhi, Leo Willyanto Santoso




Abstract


The rapid development of the Internet today to easily exchange data. This leads to high levels of risk in the data piracy. One of the ways to secure data is using cryptography camellia. Camellia is known as a method that has the encryption and decryption time is fast. Camellia method has three kinds of scale key is 128 bit, 192 bit, and 256 bit.This application is created using the C++ programming language and using visual studio 2010 GUI. This research compare the smallest and largest key size used on the file extension .Txt, .Doc, .Docx, .Jpg, .Mp4, .Mkv and .Flv. This application is made to comparing time and level of security in the use of 128-bit key and 256 bits. The comparison is done by comparing the results of the security value of avalanche effect 128 bit key and 256 bit key.


Keywords


Cryptography, camellia, avalanche effect.

References


  1. Munir, Rinaldi, Kriptografi. Bandung: Informatika, 2006.
  2. Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., & Tokita, T., Specification of Camellia-a 128-bit Block Cipher. Japan: Nippon Telegraph and Telephone Cor-poration and Mitsubishi Electric Corporation, 2000.
  3. Nippon Telegraph and Telephone Corporation, Announcement of Royalty-free Licenses for Essential Patents of NTT Encryption and Digital Signature Algorithms. http://www.ntt.co.jp/ news/news01e/0104/010417.html, 2001.
  4. Biryukov, A., Nikolic, I., Complementing Feistel Cipher. Retrieved July 8 2014, from spms.ntu.edu.sg: http://www1.spms.ntu.edu.sg/ ~syllab/m/images/6/63/Complementing_Feistel_Ciphers.pdf, 2013.
  5. Biryukov, A., Nikolic, I., Security Analysis of the Block Cipher Camellia. Retrieved July 8 2014, from cryptrec.go.jp: www.cryptrec.go.jp/ estimation/techrep_id2202-1.pdf, 2012.
  6. Rahardjo, Budi, Keamanan Sistem Informasi Berbasis Internet. Bandung: PT Insan Indonesia, Jakarta: PT INDOCISC, 2005.
  7. Ramanujam, S., & Karuppiah, M., Designing an algorithm with high avalanche effect. India: International Journal of Computer Science and Network Security,11(1), 2011.
  8. msdn.microsoft.com, Clock. Retrieved Mei 26, 2014, from msdn.microsoft.com: http://msdn. microsoft.com/en-us/library/4e2ess30.aspx, 2014.
  9. msdn.microsoft.com, How to: Marshal ANSI Strings Using C++ Interop. Retrieved Mei 12, 2014, from msdn.microsoft.com: http://msdn. microsoft.com/en-us/library/22e4dash.aspx, 2014.


Full Text: PDF

The Journal is published by The Institute of Research & Community Outreach - Petra Christian University. It available online supported by Directorate General of Higher Education - Ministry of National Education - Republic of Indonesia.

©All right reserved 2016.Jurnal Informatika, ISSN: 1411-0105

 

free hit counters
View My Stats




Copyright © Research Center Web-Dev Team