Analisa Alokasi Memori dan Kecepatan Kriptograpi Simetris Dalam Enkripsi dan Dekripsi

Authors

  • Resianta Perangin-angin Universitas Methodist Indonesia
  • Indra Kelana Jaya Universitas Methodist Indonesia
  • Benget Rumahorbo Universitas Methodist Indonesia
  • Berlian Juni R Marpaung SMK N 10 Medan

Abstract

Currently the focus of cryptography is on the security and speed of data transmission. Cryptography is the study of how to secure information. This security is done by encrypting the information with a special key. This information before being encrypted is called plaintext. After being encrypted with a key called ciphertext. At present, AES (Advanced Encryption Standard) is a cryptographic algorithm that is safe enough to protect confidential data or information. In 2001, AES was used as the latest cryptographic algorithm standard published by NIST (National Institute of Standard and Technology) in lieu of the DES (Data Encryption Standard) algorithm that has expired. The AES algorithm is a cryptographic algorithm that can encrypt and decrypt data with varying key lengths, namely 128 bits, 192 bits, and 256 bits. From the results of tests carried out for speed and classification memory, it can be concluded that the AES cryptographic algorithm is superior or faster if the size or size of the plaint text is not so large, because for the smaller AES algorithm the speed ratio in terms of encryption will become more fast, it becomes very different for the Blowfish algorithm itself where for large sizes plaint text can be encrypted faster than AES but for smaller sizes Blowfish is certainly slower in that case, for memory allocation in this case from the tests performed it can be concluded that AES requires more storage space or larger memory allocation compared to the blowfish algorithm

References

[1]M. Suresh and M. Neema, “Hardware Implementation of Blowfish Algorithm for the Secure Data Transmission in Internet of Things,” Procedia Technology, vol. 25, pp. 248–255, Jan. 2016.
[2]D. Smekal, J. Frolka, and J. Hajny, “Acceleration of AES Encryption Algorithm Using Field Programmable Gate Arrays,” IFAC-PapersOnLine, vol. 49, no. 25, pp. 384–389, Jan. 2016.
[3]D. Surian, “ALGORITMA KRIPTOGRAFI AES RIJNDAEL,” TESLA Jurnal Teknik Elektro UNTAR, vol. 8, no. 2, pp. 97–101, Oct. 2009.
[4]J. Sasongko, “Pengamanan Data Informasi menggunakan Kriptografi Klasik,” Dinamik - Jurnal Teknologi Informasi, vol. 10, no. 3, 2005.
[5]U. Farooq and M. F. Aslam, “Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA,” Journal of King Saud University - Computer and Information Sciences, vol. 29, no. 3, pp. 295–302, Jul. 2017.
[6]S. H. Putra, E. Santoso, S. Si, M. Kom, L. Muflikhah, and S. Kom, “IMPLEMENTASI ALGORITMA KRIPTOGRAFI ADVANCED ENDRYPTION STANDARD (AES) PADA KOMPRESI DATA TEKS,” Jurnal Ilmu Komputer Universitas Brawijaya, 2013.
[7]Y. P. Astuti, E. H. Rachmawanto, and C. A. Sari, “OPTIMASI ENKRIPSI PASSWORD MENGGUNAKAN ALGORITMA BLOWFISH,” Techno.Com, vol. 15, no. 1, pp. 15–21, 2016.
[8]S. Sitinjak, Y. Fauziah, and J. Juwairiah, “APLIKASI KRIPTOGRAFI FILE MENGGUNAKAN ALGORITMA BLOWFISH,” Seminar Nasional Informatika (SEMNASIF), vol. 1, no. 3, Jul. 2015.
[9]P. Patel, R. Patel, and N. Patel, “Integrated ECC and Blowfish for Smartphone Security,” Procedia Computer Science, vol. 78, pp. 210–216, Jan. 2016.
[10]A. Rosyadi, “IMPLEMENTASI ALGORITMA KRIPTOGRAFI AES UNTUK ENKRIPSI DAN DEKRIPSI EMAIL,” TRANSIENT, vol. 1, no. 3, pp. 63–67, Sep. 2012.

Downloads

Published

2019-01-01