Enkripsi Pesan Menggunakan Algoritma Linear Congruential Generator (LCG) dan Konversi Kode Morse
DOI:
https://doi.org/10.12928/biste.v3i3.5546Keywords:
Enkripsi, Linear Congruential Generator (LCG), Kode MorseAbstract
Message is an expression that is formed from a thought and feeling, reality, opinion, experience that has happened or will come, and so on. Currently, the exchange of information carried out by both the sender and the recipient has used several social media applications, such as whatsapp, telegram, line, and many more. Messages sent and received through social media applications must be connected to the internet network for the communication process in which the message can be stolen by irresponsible parties, because these parties are also connected to the same internet network. One way that can be done so that the message sent is maintained and more secure, the process of securing the data and information contained in the message is carried out. The Linear Congruential Generator (LCG) algorithm will generate a random key value and convert it into Morse code form. The results obtained from the modification of the LCG algorithm and Morse code are very helpful in the encryption process which makes the encryption results obtained quite difficult to solve because in the encryption process one plaintext character is replaced with a dot sign (.) and a minus sign (-) on the ciphertext.
Pesan merupakan ungkapan yang terbentuk dari suatu pemikiran dan perasaan, realita, opini, pengalaman yang sudah terjadi atau yang akan datang, dan lain sebagainya. Saat ini pertukaran informasi yang dilakukan baik pengirim dan penerima sudah menggunakan beberapa aplikasi media sosial, seperti whatsapp, telegram, line, dan masih banyak lagi. Pesan yang dikirim dan diterima melalui aplikasi media sosial harus terhubung dengan jaringan internet untuk proses komunikasinya yang di mana pesan tersebut dapat dicuri oleh pihak yang tidak bertanggungjawab, dikarenakan pihak-pihak tersebut juga terhubung pada jaringan internet yang sama. Salah satu cara yang dapat dilakukan agar pesan yang dikirimkan terjaga dan lebih aman, dilakukan proses pengamanan data dan informasi yang ada didalam pesan tersebut. Algoritma Linear Congruential Generator (LCG) akan menghasilkan nilai kunci secara acak dan dikonversi ke dalam bentuk kode morse. Hasil yang didapatkan dari modifikasi algoritma LCG dan konversi kode morse dapat membantu untuk proses kriptografi yang membuat hasil enkripsi pesan cukup susah untuk dibaca karena dalam proses enkripsi pesan tiap-tiap karakter plaintext akan dikonversikan dengan tanda titik (.) dan tanda kurang (-) pada cipherteksnya.
References
A. I. Warnilah and S. N. Nugraha, “Komparasi Algoritma Kriptografi Elgamal Dan Caesar Cipher Untuk Enkripsi Dan Dekripsi Pesan,” IJCIT (Indonesian Journal on Computer and Information Technology), vol. 3, no. 2, pp. 243–252, 2018, https://ejournal.bsi.ac.id/ejurnal/index.php/ijcit/article/view/4671.
A. Liliweri, Komunikasi Serba Ada Serba Makna. Jakarta: Kencana Predana Media, 2011.
S. N. Paramasari and A. Nugroho, “Strategi Komunikasi Kesehatan dalam Upaya Membangun Partisipasi Publik pada Masa Pandemi Covid-19,” J. Lensa Mutiara Komun., vol. 5, no. 1, pp. 123–132, 2021, https://doi.org/10.51544/jlmk.v5i1.2036.
Z. F. Nurhadi and A. W. Kurniawan, “Kajian Tentang Efektivitas Pesan Dalam Komunikasi,” J. Komun. Has. Pemikir. dan Penelit., vol. 3, no. 1, pp. 90–91, 2017, https://journal.uniga.ac.id/index.php/JK/article/view/253.
M. Agung, R. Roslina, and R. E. Sari, “Implementasi Aplikasi Pembuatan Chat,” Jurnal Mahasiswa Fakultas Teknik Dan Ilmu Komputer, vol. 1, no. 1, pp. 293–306, 2019, https://www.e-journal.potensi-utama.ac.id/ojs/index.php/FTIK/article/view/866.
D. N. Triwibowo and D. Ariyus, “Penerapan Algoritma Coupled Linear Congurential Generator (CLCG) pada Algortima Kriptografi One Time Pad (OTP) dalam Proses Mengamankan Pesan,” J. Media Inform. Budidarma, vol. 4, no. 3, p. 841, 2020, https://doi.org/10.30865/mib.v4i3.2244.
H. Mukhtar, Kriptografi untuk Keamanan Data. Yogyakarta: Deepublish, 2018.
G. K. Sodhi, G. S. Gaba, L. Kansal, M. El Bakkali, and F. E. Tubbal, “Implementation of message authentication code using DNA-LCG key and a novel hash algorithm,” Int. J. Electr. Comput. Eng., vol. 9, no. 1, p. 352, 2019, https://doi.org/10.11591/ijece.v9i1.pp352-358.
M. Elveny, R. Syah, I. Jaya, and I. Affandi, “Implementation of Linear Congruential Generator (LCG) Algorithm, Most Significant Bit (MSB) and Fibonacci Code in Compression and Security Messages Using Images,” J. Phys. Conf. Ser., vol. 1566, no. 1, 2020. https://doi.org/10.1088/1742-6596/1566/1/012015
D. Apdilah and H. Swanda, “Penerapan Kriptografi RSA Dalam Mengamankan File Teks Berbasis PHP,” J. Teknol. Inf., vol. 2, no. 1, p. 45, 2018. https://doi.org/10.36294/jurti.v2i1.407
O. Dakhi, M. Masril, R. Novalinda, J. Jufrinaldi, and A. Ambiyar, “Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Cipher,” INVOTEK J. Inov. Vokasional dan Teknol., vol. 20, no. 1, pp. 27–36, 2020. https://doi.org/10.24036/invotek.v20i1.647
A. M. Yusuf, Metode Penelitian : Kuantitatif, Kualitatif, dan Penelitian Gabungan. Jakarta: Kencana Predana Media, 2016.
S. Arikunto, Metode Penelitian Kuantitatif, Kualitatif, dan Kombinasi (Mixed Methods). Bandung: Alfabeta, 2014.
C. A. Haris and D. Ariyus, “Kombinasi dan Modifikasi Vigenere Cipher dan Hill Cipher Menggunakan Metode Hybrid Kode Pos, Trigonometri, dan Konversi Suhu Sebagai Pengamanan Pesan,” Inform. Mulawarman J. Ilm. Ilmu Komput., vol. 15, no. 2, p. 90, 2020, https://doi.org/10.30872/jim.v15i2.3746.
R. Prabowo and W. Pramusinto, “Implementasi Kriptografi dengan Algoritma Vigenere Cipher, AES 128 dan RC 4 untuk Aplikasi Pesan Instan Berbasis Android,” J. Skanika, vol. 1, no. 3, pp. 931–937, 2018, https://jom.fti.budiluhur.ac.id/index.php/SKANIKA/article/view/2508.
L. Dong and K. Chen, Cryptographic Protocol : Security Analysis Based on Trusted Freshness. Beijing: Higher Education Press.
S. Hallgren, Linear Congruential Generators Over Elliptic Curves, Pittsburgh: Carnegie Mellon University, 1994.
D. H. Lehmer, Random Number Generation on the BRL Highspeed Computing Machines, London: Math. Rev 15, 1954.
A. Wijaya, E. Kwok, and H. Agung, “Aplikasi Morse Code Translator Metode Klasifikasi Euclidean Distance dengan Algoritma Ocrchie untuk Menerjemahkan Kode Morse,” KALBISCIENTIA J. Sains dan Teknol., vol. 5, no. 1, pp. 30–34, 2018, http://research.kalbis.ac.id/Research/Files/Article/Full/5GJT98A5SN6NP8S131Z5HQAM3.pdf.
S. F. B. Morse, Samuel F. B. Morse : His Letters and Journals (Volume 1), London: Cambridge University Press, 2014, https://doi.org/10.1017/CBO9781107449923.
N. Chafid and A. Saputra, “Penerapan Metode Binary Search Tree Untuk Deskirpsi Sandi Morse berbasis Android,” J. Univ. Satya Negara Indones., vol. 10, no. 1, pp. 1–10, 2017, https://lppm.usni.ac.id/jurnal/chafid.pdf.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Deny Nugroho Triwibowo, Purwono, Imam Ahmad Ashari , Arif Setia Sandi , Yusuf Fadlila Rahman
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.