Abstract

Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman) algorithm. The advantages of hybrid cryptography is the speed in processing data using a symmetric algorithm and easy transfer of key using asymmetric algorithm. This can increase the speed of transaction processing data. Stream Cipher Algorithm using the image digital signature as a keys, that will be secured by the RSA algorithm. So, the key for encryption and decryption are different. Blum Blum Shub methods used to generate keys for the value p, q on the RSA algorithm. It will be very difficult for a cryptanalyst to break the key. Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger or smaller so that the time required for encryption and decryption process is relatively fast.

Highlights

  • Using a cryptographic algorithm can often be penetrated by a cryptanalyst because they use the same key for decryption and encryption

  • Hybrid cryptography is often used because it takes advantage of the data processing speed with a symmetric algorithm and easy transfer key using an asymmetric algorithm

  • Cryptographic stream cipher algorithms and the RSA algorithm becomes an issue in research related to information security that will be developed by the researchers

Read more

Summary

INTRODUCTION

Using a cryptographic algorithm can often be penetrated by a cryptanalyst because they use the same key for decryption and encryption. Hybrid cryptography is often used because it takes advantage of the data processing speed with a symmetric algorithm and easy transfer key using an asymmetric algorithm. If the plants emit a stream cipher a truly random (truly random), the same encryption algorithm with a one-time-pad with a perfect level of security. In this case the flow-bit-key as long as the length of plaintext and ciphertext as an unbreakable cipher get. Hybrid cryptographic stream cipher algorithm and uses RSA digital signatures as a key, and Blum Blum Shub generator that serves to lock and to determine the value of p, q on the RSA algorithm. Will provide some of the benefits that can improve information security and efficiency data

MATERIALS AND METHODS
ANALYSIS PROCESS
Plaintext encryption with the following equation:
Analysis Process Generator The value of p and q with Blum Blum shub
Analysis Process decryption with Stream Cipher Algorithm
AND DISCUSSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call