Three Pass Protocol untuk Keamanan Kunci Berbasis Base64 pada XOR Cipher

Oris Krianto Sulaiman, Khairuddin Nasution, Mhd. Zulfansyuri Siambaton

Abstract


XOR cipher is a message randomization algorithm by performing XOR logical operations for plaintext and key so that it becomes a ciphertext. The problem lies in the predictable use of XOR. Therefore, it uses key security using the Three Pass Protocol. This protocol secures communication for each party. The key used for Three Pass Protocol communication is Base64. The Three Pass Protocol scheme for XOR Cipher key security using Base64 has a weakness because it is due to the Base64 encoding process which by default is easy for others to know. So that this research can be developed again to replace Base64 into a better algorithm in terms of security.

Full Text:

PDF

References


A. P. Galih, “Keamanan Informasi (Information Security) Pada Aplikasi Perpustakaan IPusnas,” AL Maktabah, vol. 5, no. 1, p. 10, 2020, doi: 10.29300/mkt.v5i1.3086.

I. Darmayanti, D. N. Astrida, and D. Arius, “Penerapan Keamanan Pesan Teks Menggunakan Modifikasi Algoritma Caisar Chiper Kedalam Bentuk Sandi Morse,” Jurnal IT CIDA, vol. 4, no. 1, pp. 39–47, 2018.

O. Krianto Sulaiman, “Hybrid Cryptosystem Menggunakan Xor Cipher Dan Merkle-Hellman Knapsack Untuk Menjaga Kerahasiaan Pesan Digital,” Jurnal Teknologi Informasi, vol. 3, no. 2, pp. 169–173, 2019.

J. H. Lubis, “Implementasi Keamanan Data Dengan Metode Kriptografi XOR,” Jurnal Sistem Informasi Kaputama (JSIK), vol. 2, no. 2, pp. 1–4, 2018.

R. Amalia and P. Rosyani, “Implementasi Algoritma AES dan Algoritma XOR pada Aplikasi Enkripsi dan Dekripsi Teks Berbasis Android,” Faktor Exacta, vol. 11, no. 4, p. 370, 2018, doi: 10.30998/faktorexacta.v11i4.2878.

Suhardi, “Aplikasi Kriptografi Data Sederhana Dengan Metode Exlusive-or (Xor),” Jurnal Teknovasi, vol. 03, no. 2, pp. 23–31, 2016.

O. K. Sulaiman, K. Nasution, and S. Y. Prayogi, “Base64 Sebagai Kunci Keamanan pada One Time Pad (OTP),” CESS (Journal of Computer Engineering, System and Science), vol. 5, no. 2, p. 241, 2020, doi: 10.24114/cess.v5i2.19622.

S. Prayudi et al., “Analisis keamanan pada kombinasi protokol secret sharing dan three-pass,” vol. IV, no. 2, pp. 1–6, 2015.

B. Oktaviana and A. P. Utama Siahaan, “Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography,” IOSR Journal of Computer Engineering, vol. 18, no. 04, pp. 26–29, 2016, doi: 10.9790/0661-1804032629.




DOI: http://dx.doi.org/10.30645/j-sakti.v4i2.338

Refbacks

  • There are currently no refbacks.


J-SAKTI (Jurnal Sains Komputer & Informatika)
Published Papers Indexed/Abstracted By:

Jumlah Kunjungan :

View My Stats