ENKRIPSI DAN DEKRIPSI GAMBAR DENGAN MENGGUNAKAN PERPADUAN ALGORITMA BASE64 DAN RC4

Marta Darma Putra, Mardhiya - Hayaty

Abstract


Data security is a thing everyone wants to maintain privacy. Both from the security of data in personal memory or even when sending the data. In this research, the encryption process is done by converting the image data into String and stored temporary file as temporary file, encryption method using RC4 cryptographic algorithm because RC4 algorithm operates with XOR method so XOR encryption operation is done very quickly assisted by Base64 encode algorithm in overcoming the data reading 0x00 [NUL] in image file when data is converted to string, this research is done by prototyping method, designed with SWOT method of analysis and system feasibility analysis and system design with flowchart and UML, implemented with flatform Responsive web application, and has been tested and feasible to implement. The results obtained from this research are RC4 can be operated on the image if assisted with base64, and successfully tested with 5 types of images Tiff, png, jpg, gif, bmp with a maximum limit of 2MB file size.


Full Text:

PDF

References


M. Ir Yusuf Kurniawan, KRIPOGRAFI Keamanan Internet dan JaringanKomunikasi, Bandung: Informatika, 2004.

E. L. Hakim, Khairil and f. H. Utami, "Aplikasi Enkripsi Dan Dekripsi Data Menggunakan Algoritma RC4 Dengan Menggunakan Bahasa Pemrograman Php.," Media Informatika, vol. 10, p. 1, 2014.

O. Setiawan, R. Fiati and T. Listyorini, "Algoritma Enkripsi RC4 sebagai metode Obfuscation Source Code Php.," Prosiding SNATIF, vol. 1, 2014.

D. Hendarsyah and R. Wardoyo, "Implementasi Protokol Diffie-Hellman Dan Algoritma RC4 untuk Keamanan Pesan SMS," IJCCS, vol. 5, p. 1, 2011.

D. Arius, Kriftografi Keamanan Data dan Komunikasi, Yogyakarta: Graha Ilmu, 2006.

G. Singh and Supriya, "Modified Vigenere Encryption Algorithm and its Hybrid Implementation with Base64 and AES," Second International Conference on Advanced Computing, Networking and Security, 2013.

S. Rifki, Kriftografi Untuk Keamanan Jaringan, Yogyakarta: ANDI, 2012.

D. S. 2. S. D. 3, Chapter 3: Characters and Strings.


Refbacks

  • There are currently no refbacks.