PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY
:
https://doi.org/10.9744/informatika.12.2.109-116Keywords:
Cryptography, camellia, avalanche effect.Abstract
The rapid development of the Internet today to easily exchange data. This leads to high levels of risk in the data piracy. One of the ways to secure data is using cryptography camellia. Camellia is known as a method that has the encryption and decryption time is fast. Camellia method has three kinds of scale key is 128 bit, 192 bit, and 256 bit.This application is created using the C++ programming language and using visual studio 2010 GUI. This research compare the smallest and largest key size used on the file extension .Txt, .Doc, .Docx, .Jpg, .Mp4, .Mkv and .Flv. This application is made to comparing time and level of security in the use of 128-bit key and 256 bits. The comparison is done by comparing the results of the security value of avalanche effect 128 bit key and 256 bit key.References
Munir, Rinaldi, Kriptografi. Bandung: Informatika, 2006.
Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., & Tokita, T., Specification of Camellia-a 128-bit Block Cipher. Japan: Nippon Telegraph and Telephone Cor-poration and Mitsubishi Electric Corporation, 2000.
Nippon Telegraph and Telephone Corporation, Announcement of Royalty-free Licenses for Essential Patents of NTT Encryption and Digital Signature Algorithms. http://www.ntt.co.jp/ news/news01e/0104/010417.html, 2001.
Biryukov, A., Nikolic, I., Complementing Feistel Cipher. Retrieved July 8 2014, from spms.ntu.edu.sg: http://www1.spms.ntu.edu.sg/ ~syllab/m/images/6/63/Complementing_Feistel_Ciphers.pdf, 2013.
Biryukov, A., Nikolic, I., Security Analysis of the Block Cipher Camellia. Retrieved July 8 2014, from cryptrec.go.jp: www.cryptrec.go.jp/ estimation/techrep_id2202-1.pdf, 2012.
Rahardjo, Budi, Keamanan Sistem Informasi Berbasis Internet. Bandung: PT Insan Indonesia, Jakarta: PT INDOCISC, 2005.
Ramanujam, S., & Karuppiah, M., Designing an algorithm with high avalanche effect. India: International Journal of Computer Science and Network Security,11(1), 2011.
msdn.microsoft.com, Clock. Retrieved Mei 26, 2014, from msdn.microsoft.com: http://msdn. microsoft.com/en-us/library/4e2ess30.aspx, 2014.
msdn.microsoft.com, How to: Marshal ANSI Strings Using C++ Interop. Retrieved Mei 12, 2014, from msdn.microsoft.com: http://msdn. microsoft.com/en-us/library/22e4dash.aspx, 2014.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).