Analisa Alokasi Memori dan Kecepatan Kriptograpi Simetris Dalam Enkripsi dan Dekripsi
Abstract
Currently the focus of cryptography is on the security and speed of data transmission. Cryptography is the study of how to secure information. This security is done by encrypting the information with a special key. This information before being encrypted is called plaintext. After being encrypted with a key called ciphertext. At present, AES (Advanced Encryption Standard) is a cryptographic algorithm that is safe enough to protect confidential data or information. In 2001, AES was used as the latest cryptographic algorithm standard published by NIST (National Institute of Standard and Technology) in lieu of the DES (Data Encryption Standard) algorithm that has expired. The AES algorithm is a cryptographic algorithm that can encrypt and decrypt data with varying key lengths, namely 128 bits, 192 bits, and 256 bits. From the results of tests carried out for speed and classification memory, it can be concluded that the AES cryptographic algorithm is superior or faster if the size or size of the plaint text is not so large, because for the smaller AES algorithm the speed ratio in terms of encryption will become more fast, it becomes very different for the Blowfish algorithm itself where for large sizes plaint text can be encrypted faster than AES but for smaller sizes Blowfish is certainly slower in that case, for memory allocation in this case from the tests performed it can be concluded that AES requires more storage space or larger memory allocation compared to the blowfish algorithmReferences
[1]M. Suresh and M. Neema, “Hardware Implementation of Blowfish Algorithm for the Secure Data Transmission in Internet of Things,†Procedia Technology, vol. 25, pp. 248–255, Jan. 2016.
[2]D. Smekal, J. Frolka, and J. Hajny, “Acceleration of AES Encryption Algorithm Using Field Programmable Gate Arrays,†IFAC-PapersOnLine, vol. 49, no. 25, pp. 384–389, Jan. 2016.
[3]D. Surian, “ALGORITMA KRIPTOGRAFI AES RIJNDAEL,†TESLA Jurnal Teknik Elektro UNTAR, vol. 8, no. 2, pp. 97–101, Oct. 2009.
[4]J. Sasongko, “Pengamanan Data Informasi menggunakan Kriptografi Klasik,†Dinamik - Jurnal Teknologi Informasi, vol. 10, no. 3, 2005.
[5]U. Farooq and M. F. Aslam, “Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA,†Journal of King Saud University - Computer and Information Sciences, vol. 29, no. 3, pp. 295–302, Jul. 2017.
[6]S. H. Putra, E. Santoso, S. Si, M. Kom, L. Muflikhah, and S. Kom, “IMPLEMENTASI ALGORITMA KRIPTOGRAFI ADVANCED ENDRYPTION STANDARD (AES) PADA KOMPRESI DATA TEKS,†Jurnal Ilmu Komputer Universitas Brawijaya, 2013.
[7]Y. P. Astuti, E. H. Rachmawanto, and C. A. Sari, “OPTIMASI ENKRIPSI PASSWORD MENGGUNAKAN ALGORITMA BLOWFISH,†Techno.Com, vol. 15, no. 1, pp. 15–21, 2016.
[8]S. Sitinjak, Y. Fauziah, and J. Juwairiah, “APLIKASI KRIPTOGRAFI FILE MENGGUNAKAN ALGORITMA BLOWFISH,†Seminar Nasional Informatika (SEMNASIF), vol. 1, no. 3, Jul. 2015.
[9]P. Patel, R. Patel, and N. Patel, “Integrated ECC and Blowfish for Smartphone Security,†Procedia Computer Science, vol. 78, pp. 210–216, Jan. 2016.
[10]A. Rosyadi, “IMPLEMENTASI ALGORITMA KRIPTOGRAFI AES UNTUK ENKRIPSI DAN DEKRIPSI EMAIL,†TRANSIENT, vol. 1, no. 3, pp. 63–67, Sep. 2012.
[2]D. Smekal, J. Frolka, and J. Hajny, “Acceleration of AES Encryption Algorithm Using Field Programmable Gate Arrays,†IFAC-PapersOnLine, vol. 49, no. 25, pp. 384–389, Jan. 2016.
[3]D. Surian, “ALGORITMA KRIPTOGRAFI AES RIJNDAEL,†TESLA Jurnal Teknik Elektro UNTAR, vol. 8, no. 2, pp. 97–101, Oct. 2009.
[4]J. Sasongko, “Pengamanan Data Informasi menggunakan Kriptografi Klasik,†Dinamik - Jurnal Teknologi Informasi, vol. 10, no. 3, 2005.
[5]U. Farooq and M. F. Aslam, “Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA,†Journal of King Saud University - Computer and Information Sciences, vol. 29, no. 3, pp. 295–302, Jul. 2017.
[6]S. H. Putra, E. Santoso, S. Si, M. Kom, L. Muflikhah, and S. Kom, “IMPLEMENTASI ALGORITMA KRIPTOGRAFI ADVANCED ENDRYPTION STANDARD (AES) PADA KOMPRESI DATA TEKS,†Jurnal Ilmu Komputer Universitas Brawijaya, 2013.
[7]Y. P. Astuti, E. H. Rachmawanto, and C. A. Sari, “OPTIMASI ENKRIPSI PASSWORD MENGGUNAKAN ALGORITMA BLOWFISH,†Techno.Com, vol. 15, no. 1, pp. 15–21, 2016.
[8]S. Sitinjak, Y. Fauziah, and J. Juwairiah, “APLIKASI KRIPTOGRAFI FILE MENGGUNAKAN ALGORITMA BLOWFISH,†Seminar Nasional Informatika (SEMNASIF), vol. 1, no. 3, Jul. 2015.
[9]P. Patel, R. Patel, and N. Patel, “Integrated ECC and Blowfish for Smartphone Security,†Procedia Computer Science, vol. 78, pp. 210–216, Jan. 2016.
[10]A. Rosyadi, “IMPLEMENTASI ALGORITMA KRIPTOGRAFI AES UNTUK ENKRIPSI DAN DEKRIPSI EMAIL,†TRANSIENT, vol. 1, no. 3, pp. 63–67, Sep. 2012.
Downloads
Published
2019-01-01
Issue
Section
Artikel
License
Penulis yang menerbitkan jurnal ini menyetujui persyaratan berikut:
- Penulis memiliki hak cipta dan memberikan hak untuk publikasi pertama jurnal dengan karya yang secara simultan dilisensikan di bawah Creative Commons Attribution License yang memungkinkan orang lain untuk berbagi karya dengan pengakuan kepengarangan karya dan publikasi awal dalam jurnal ini.
- Penulis dapat membuat perjanjian kontrak tambahan yang terpisah untuk distribusi non-eksklusif versi jurnal yang diterbitkan dari karya tersebut (misalnya, mempostingnya ke repositori institusional atau menerbitkannya dalam sebuah buku), dengan pengakuan atas publikasi awalnya di jurnal ini.
- Penulis diizinkan dan didorong untuk memposting karya mereka secara online (misalnya, dalam repositori institusional atau di situs web mereka) sebelum dan selama proses pengajuan, karena dapat menyebabkan pertukaran yang produktif, serta kutipan yang lebih awal dan lebih besar dari karya yang diterbitkan (Lihat Pengaruh Akses Terbuka).