Implementasi Algoritma Lucifer untuk Autentikasi Sound Chat

Authors

  • Ade Sani Afrianda Universitas Budi Darma, Medan

Keywords:

Kriptografi; Lucifer; Sound Chat

Abstract

Voice chat is one of the ways used to send a message through a chat application, where voice chat contains messages in the form of voice. There are problems in the process of sending voice chats, where in the delivery process there can be damage or manipulation of sound that can be done by parties who are not involved in the voice chat. In this case, security is needed to maintain the authenticity of the chat voice to avoid damage or what can be done by non-existent parties. Cryptographic techniques can be used to maintain the authenticity of voice chats with encryption and decryption processes so that they can minimize damage or damage to voice chats that can be done by parties who do not. The lucifer algorithm is an algorithm that can perform cryptographic techniques, where the lucifer algorithm encrypts data that has been divided into blocks. This study uses the lucifer algorithm for the encryption and decryption process. A voice chat will be encrypted using the lucifer algorithm to produce ciphersound. This process can increase the security and authenticity of the chat voice in the sending process and will not arouse suspicion from other parties who are not responsible for knowing the authenticity of the chat voice.

References

M. Mizan, "Studi Perbandingan Algoritma Simetri Lucifer dan Blowfish," Institut Teknologi Bandung, Bandung, 2010.

Pengertian Menurut Para Ahli, (2016,jun.1). Pengertian Implementasi [online].Available:https://www.pengertianmenurutparaahli.net/pengertian- implementasi/

Wikipedia, (2019, Jul 27). Algoritma [online].

Available: https://id.wikipedia.org/wiki/Algoritme

S. Kromodimoeljo, Teori dan Aplikasi Kriptografi, : SPK IT Consulting, 2009.

B. Aroya and E. Biham, "Differential Cryptanalysis of Lucifer," Journal of Cryptology, vol. 9, no. 1, pp. 21-34, 1996.

B. Buchanan, "Feistel Ciphers," Medium Corporation, 16 September 2018. [Online]. Available: https://medium.com/asecuritysite-when-bob-met- alice/feistel-ciphers-18b400f9e1a9. [Accessed 28 April 2019].

S. Dharwiyanti and R. S. Wahono, "Pengantar Unified Modeling Language (UML)," IlmuKomputer.Com, 2003.

E. Shygan, "Daftar Simbol UML," 24 May 2013. [Online]. Available: https://id.scribd.com/document/143412967/Daftar-Simbol-Uml. [Accessed 08 May 2019].

E. Sutanta, Pengantar Teknologi Informasi, Yogyakarta: Graha Ilmu. 2005

Hendrayudi, Dasar-Dasar Pemograman Microsoft Visual Basic 2008, Bandung: SatuNusa, 2011.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Algoritma Lucifer untuk Autentikasi Sound Chat

Published

2024-06-29

Issue

Section

Articles