PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY

Authors

  • Lanny Sutanto Program Studi Teknik Informatika Fakultas Teknologi Industri Universitas Kristen Petra Jl. Siwalankerto 121–131 Surabaya 60236
  • Gregorius Satia Budhi Program Studi Teknik Informatika Fakultas Teknologi Industri Universitas Kristen Petra Jl. Siwalankerto 121–131 Surabaya 60236
  • Leo Willyanto Santoso Program Studi Teknik Informatika Fakultas Teknologi Industri Universitas Kristen Petra Jl. Siwalankerto 121–131 Surabaya 60236

:

https://doi.org/10.9744/informatika.12.2.109-116

Keywords:

Cryptography, camellia, avalanche effect.

Abstract

The rapid development of the Internet today to easily exchange data. This leads to high levels of risk in the data piracy. One of the ways to secure data is using cryptography camellia. Camellia is known as a method that has the encryption and decryption time is fast. Camellia method has three kinds of scale key is 128 bit, 192 bit, and 256 bit.This application is created using the C++ programming language and using visual studio 2010 GUI. This research compare the smallest and largest key size used on the file extension .Txt, .Doc, .Docx, .Jpg, .Mp4, .Mkv and .Flv. This application is made to comparing time and level of security in the use of 128-bit key and 256 bits. The comparison is done by comparing the results of the security value of avalanche effect 128 bit key and 256 bit key.

References

Munir, Rinaldi, Kriptografi. Bandung: Informatika, 2006.

Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., & Tokita, T., Specification of Camellia-a 128-bit Block Cipher. Japan: Nippon Telegraph and Telephone Cor-poration and Mitsubishi Electric Corporation, 2000.

Nippon Telegraph and Telephone Corporation, Announcement of Royalty-free Licenses for Essential Patents of NTT Encryption and Digital Signature Algorithms. http://www.ntt.co.jp/ news/news01e/0104/010417.html, 2001.

Biryukov, A., Nikolic, I., Complementing Feistel Cipher. Retrieved July 8 2014, from spms.ntu.edu.sg: http://www1.spms.ntu.edu.sg/ ~syllab/m/images/6/63/Complementing_Feistel_Ciphers.pdf, 2013.

Biryukov, A., Nikolic, I., Security Analysis of the Block Cipher Camellia. Retrieved July 8 2014, from cryptrec.go.jp: www.cryptrec.go.jp/ estimation/techrep_id2202-1.pdf, 2012.

Rahardjo, Budi, Keamanan Sistem Informasi Berbasis Internet. Bandung: PT Insan Indonesia, Jakarta: PT INDOCISC, 2005.

Ramanujam, S., & Karuppiah, M., Designing an algorithm with high avalanche effect. India: International Journal of Computer Science and Network Security,11(1), 2011.

msdn.microsoft.com, Clock. Retrieved Mei 26, 2014, from msdn.microsoft.com: http://msdn. microsoft.com/en-us/library/4e2ess30.aspx, 2014.

msdn.microsoft.com, How to: Marshal ANSI Strings Using C++ Interop. Retrieved Mei 12, 2014, from msdn.microsoft.com: http://msdn. microsoft.com/en-us/library/22e4dash.aspx, 2014.

Downloads

Published

2015-01-01

How to Cite

Sutanto, L., Budhi, G. S., & Santoso, L. W. (2015). PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY. Jurnal Informatika, 12(2), 109-116. https://doi.org/10.9744/informatika.12.2.109-116