Text Encoding Using Cipher Block Chaining Algorithm
DOI:
https://doi.org/10.54209/infosains.v11i2.42Keywords:
Cryptography, Text Encoding, Cipher Block Chaining, AlgorithmAbstract
. Data confidentiality and security are critical in data communication, both for the purpose of shared security, and for individual privacy. Computer users who want their data unknown to unauthorized parties are always trying to work out how to secure the information that will be communicated or that will be stored. Protection against data confidentiality is increasing, one way is by applying cryptographic science. Cipher Block Chaining (CBC), this mode is a feedback mechanism on a block, and in this case the result of the previous block encryption is feedback into the current block encryption. The trick is to block the current plaintext in XOR first with the ciphertext block of the previous encryption result, then the result of this XOR-ing goes into the encryption function. With CBC mode, each ciphertext block is calculated not only on its plaintext block but also on the entire previous plaintext block. The author tries to co-create a text encoding to secure the data with the Cipher Block Chaining (CBC) cryptographic method.
Downloads
References
W. Zhai, “Design and application of a remote electronic communication teaching system in a network environment,” Int. J. Emerg. Technol. Learn., vol. 13, no. 4, 2018, doi: 10.3991/ijet.v13i04.8480.
A. Prameshwari and N. P. Sastra, “Implementasi Algoritma Advanced Encryption Standard (AES) 128 Untuk Enkripsi dan Dekripsi File Dokumen,” Eksplora Inform., vol. 8, no. 1, 2018, doi: 10.30864/eksplora.v8i1.139.
W. M. Rahmawati and F. Liantoni, “Penggunaan Arnold Cat Map Dan Beta Chaotic Map Pada Enkripsi Data Citra,” J. ELTIKOM, vol. 2, no. 2, 2018, doi: 10.31961/eltikom.v2i2.85.
J. C. Das and D. De, “Qca based secure nanocommunication block cipher design based on electronic code book,” Malaysian J. Comput. Sci., vol. 31, no. 2, 2018, doi: 10.22452/mjcs.vol31no2.3.
D. Vetri Priya and R. Kamaraj, “An invasive launch of two compendiums: Orange book and purple book by FDA,” Research Journal of Pharmacy and Technology, vol. 11, no. 8. 2018, doi: 10.5958/0974-360X.2018.00666.2.
S. Retno and N. Hasdyna, “ANALISIS KINERJA ALGORITMA HONEY ENCRYPTION DAN ALGORITMA BLOWFISH PADA PROSES ENKRIPSI DAN DEKRIPSI,” TECHSI - J. Tek. Inform., vol. 10, no. 2, 2018, doi: 10.29103/techsi.v10i2.858.
Rusmala and D. Prasti, “Implementasi Metode Rail Fence Chiper dan Row Transposition Chiper Pada Mata Kuliah Kriptograpi,” Ilm. d’Computare, vol. 9, 2019.
A. P. Sidik et al., “Teknik Xor Pada Mode Operasi Algoritma Cipher Block Chaining (Cbc) Dengan Kunci Acak Blum Blum Shub Dalam Meningkatkan Keamanan Data,” J. Mantik Penusa, vol. 3, no. 2, 2019.
R. Syahputra, “Penerapan Mode Operasi Cipher Block Chaining Dan Metode Lsb-1 Dalam Pengamanan Data Teks,” J. Pelita Inform., vol. 16, no. Juli, 2017.
N. R. D. Pujiastuti, “Perancangan Modifikasi Kriptografi Modern CBC untuk Pengamanan Data/File Text,” e-print UAD, 2017.
D. Lombu, S. D. Tarihoran, and I. Gulo, “Kombinasi Mode Cipher Block Chaining Dengan Algoritma Triangle Chain Cipher Pada Penyandian Login Website,” J-SAKTI (Jurnal Sains Komput. dan Inform., vol. 2, no. 1, 2018, doi: 10.30645/j-sakti.v2i1.51.