Implementasi Algoritma Lucifer untuk Autentikasi Sound Chat
Keywords:
Kriptografi; Lucifer; Sound ChatAbstract
Voice chat is one of the ways used to send a message through a chat application, where voice chat contains messages in the form of voice. There are problems in the process of sending voice chats, where in the delivery process there can be damage or manipulation of sound that can be done by parties who are not involved in the voice chat. In this case, security is needed to maintain the authenticity of the chat voice to avoid damage or what can be done by non-existent parties. Cryptographic techniques can be used to maintain the authenticity of voice chats with encryption and decryption processes so that they can minimize damage or damage to voice chats that can be done by parties who do not. The lucifer algorithm is an algorithm that can perform cryptographic techniques, where the lucifer algorithm encrypts data that has been divided into blocks. This study uses the lucifer algorithm for the encryption and decryption process. A voice chat will be encrypted using the lucifer algorithm to produce ciphersound. This process can increase the security and authenticity of the chat voice in the sending process and will not arouse suspicion from other parties who are not responsible for knowing the authenticity of the chat voice.
References
M. Mizan, "Studi Perbandingan Algoritma Simetri Lucifer dan Blowfish," Institut Teknologi Bandung, Bandung, 2010.
Pengertian Menurut Para Ahli, (2016,jun.1). Pengertian Implementasi [online].Available:https://www.pengertianmenurutparaahli.net/pengertian- implementasi/
Wikipedia, (2019, Jul 27). Algoritma [online].
Available: https://id.wikipedia.org/wiki/Algoritme
S. Kromodimoeljo, Teori dan Aplikasi Kriptografi, : SPK IT Consulting, 2009.
B. Aroya and E. Biham, "Differential Cryptanalysis of Lucifer," Journal of Cryptology, vol. 9, no. 1, pp. 21-34, 1996.
B. Buchanan, "Feistel Ciphers," Medium Corporation, 16 September 2018. [Online]. Available: https://medium.com/asecuritysite-when-bob-met- alice/feistel-ciphers-18b400f9e1a9. [Accessed 28 April 2019].
S. Dharwiyanti and R. S. Wahono, "Pengantar Unified Modeling Language (UML)," IlmuKomputer.Com, 2003.
E. Shygan, "Daftar Simbol UML," 24 May 2013. [Online]. Available: https://id.scribd.com/document/143412967/Daftar-Simbol-Uml. [Accessed 08 May 2019].
E. Sutanta, Pengantar Teknologi Informasi, Yogyakarta: Graha Ilmu. 2005
Hendrayudi, Dasar-Dasar Pemograman Microsoft Visual Basic 2008, Bandung: SatuNusa, 2011.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma Lucifer untuk Autentikasi Sound Chat
Published
Issue
Section
Copyright (c) 2024 Ade Sani Afrianda
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).