Data security using low bit encoding algorithm and rsa algorithm
Main Article Content
Abstract
Ensuring the security of messages and information is paramount in today's digital era. This study proposes a combined approach using the RSA algorithm for cryptography and the Low Bit Encoding (LBE) algorithm for steganography to enhance security measures. The security process involves encrypting plaintext messages into ciphertext, which are then embedded into MP3 audio files as cover objects. Evaluation is conducted by measuring the Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) of the stego audio. Research findings indicate an MSE value of approximately 0.6 and a PSNR of 62.2 dB, indicating high-quality audio files. The integration of these algorithms offers a robust security level, ensuring effective message confidentiality. This research contributes to a deeper understanding of cryptography and steganography techniques in safeguarding sensitive information during digital communication
Downloads
Article Details
Abid, r., iwendi, c., javed, a. R., rizwan, m., jalil, z., anajemba, j. H., & biamba, c. (2023). An optimised homomorphic crt-rsa algorithm for secure and efficient communication. Personal and ubiquitous computing, 27(3), 1405–1418. Https://doi.org/10.1007/s00779-021-01607-3
Andika, s. (2021). Implementasi algoritma freivlds untuk pembangkitan kunci algoritmarsa pada pengamanan data video. Pelita informatika?: informasi dan informatika, 10(2), 70–77.
Anitha, s., saravanan, s., & chandrasekar, a. (2023). Trust management based multidimensional secure cluster with rsa cryptography algorithm in wsn for secure data transmission. Measurement: sensors, 29(may), 100889. Https://doi.org/10.1016/j.measen.2023.100889
Annisa, s., seta, h. B., & falih, n. (2022). Model pengamanan berkas menggunakan kriptografi asimetris rsa dan algoritma kompresi ppm pada file curriculum vitae (cv). Informatik?: jurnal ilmu komputer, 18(2), 177. Https://doi.org/10.52958/iftk.v18i2.4669
Arbin, s., & hariyanto, e. (2022). Application of crt (chinese reminder theorem) to speed up the process of data security on image files. Jurnal sean institute, 10(2), 1312–1320.
Ariyus, d., kurniasih, j., & profesi, d. E. (2021). Modifikasi kunci simetris caesar cipher dan otp menggunakan algoritma genetika pada steganografi. Csrid (computer science research and its development journal), 11(1), 34. Https://doi.org/10.22303/csrid.11.1.2019.34-43
Christian, c., sitorus, s. H., & nirmala, i. (2023). Implementasi algoritma rsa dan one time password (otp) untuk pengamanan data pengguna dan proses transaksi pada website e-commerce. Coding: jurnal komputer dan aplikasi, 11(1), 62–72.
Huang, h., & han, z. (2024). Computational ghost imaging encryption using rsa algorithm and discrete wavelet transform. Results in physics, 56(november 2023), 107282. Https://doi.org/10.1016/j.rinp.2023.107282
Lorien, a., & wellem, t. (2021). Implementasi sistem otentikasi dokumen berbasis quick response (qr) code dan digital signature. Jurnal resti (rekayasa sistem dan teknologi informasi), 5(4), 663–671. Https://doi.org/10.29207/resti.v5i4.3316
Lubis, i., & dafitri, h. (2023). Analisis kinerja sistem kripto kompresi pada file dokumen dengan algoritma asimetris rsa dan even rodeh code. Snastikom, 10(3), 1–11.
Mohamad, m. S. A., din, r., & ahmad, j. I. (2021). Research trends review on rsa scheme of asymmetric cryptography techniques. Bulletin of electrical engineering and informatics, 10(1), 487–492. Https://doi.org/10.11591/eei.v10i1.2493
Mojisola, f. O., misra, s., falayi febisola, c., abayomi-alli, o., & sengul, g. (2022). An improved random bit-stuffing technique with a modified rsa algorithm for resisting attacks in information security (rbmrsa). Egyptian informatics journal, 23(2), 291–301. Https://doi.org/10.1016/j.eij.2022.02.001
Osamor, v. C., & edosomwan, i. B. (2021). Employing scrambled alpha-numberic randomization and rsa algorithm to ensure enhanced encryption in electronic medical record. Informatics in medicine unlocked, 25(2), 100672. Https://doi.org/10.1016/j.imu.2021.100672
Pahrizal, d. P. (2019). Implementasi algoritma rsa untuk pengamanan data berbentuk teks. Jurnal pseudocode, iii(1), issn?: 2355 – 5920.
Patana, p., alikodra, h. S., mawengkang, h., & hamdani harahap, r. (2023). State of human tiger conflict around gunung leuser national park in langkat landscape, north sumatra, indonesia. Biodiversitas, 24(2), 837–846. Https://doi.org/10.13057/biodiv/d240220
Santoso, y. S. (2021). Message security using a combination of hill cipher and rsa algorithms. Jurnal matematika dan ilmu pengetahuan alam lldikti wilayah 1 (jumpa), 1(1), 20–28. Https://doi.org/10.54076/jumpa.v1i1.38
Sihotang, h. T., efendi, s., zamzami, e. M., & mawengkang, h. (2020). Design and implementation of rivest shamir adleman’s (rsa) cryptography algorithm in text file data security. Journal of physics: conference series, 1641(1). Https://doi.org/10.1088/1742-6596/1641/1/012042
Sutejo, s. (2021). Implementasi algoritma kriptografi rsa (rivest shamir adleman) untuk keamanan data rekam medis pasien. Intecoms: journal of information technology and computer science, 4(1), 104–114. Https://doi.org/10.31539/intecoms.v4i1.2437
Ulva, a. (2021). Implementasi algoritma kargers min cut untuk pembangkitan kunci algoritma rsa pada pengamanan data video. Pelita informatika?: informasi dan informatika, 10(2), 58–64.
Usanto, u. (2022). Aplikasi enkripsi dengan algoritma rivest shami aldeman (rsa) dan parity bit coding untuk file multimedia. Jeis: jurnal elektro dan informatika swadharma, 2(2), 17–28. Https://doi.org/10.56486/jeis.vol2no2.179
Yu, h., & kim, y. (2020). New rsa encryption mechanism using one-time encryption keys and unpredictable bio-signal for wireless communication devices. Electronics (switzerland), 9(2), 1–10. Https://doi.org/10.3390/electronics9020246
Zalukhu, k., syahra, y., & syahputra, t. (2020). Implementasi sistem keamanan database data pelanggaran hukum disiplin prajurit menggunakan algoritma advanced encryption standard 128 bit pada pengadilan militer i-02 medan. J-sisko tech (jurnal teknologi sistem informasi dan sistem komputer tgd), 3(2), 138. Https://doi.org/10.53513/jsk.v3i2.2419

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.