Implementasi Kriptografi Hybrid Algoritma Elgamal Dan Double Playfair Cipher Dalam Pengamanan File Jpeg Berbasis Dekstop
DOI:
https://doi.org/10.47065/jieee.v1i2.295Keywords:
Digital Image; ElGama; Double Playfair CipherAbstract
Digital image is a representative of the image taken by the machine with a form of approach based on sampling and quantization. Sampling states the size of the boxes arranged in rows and columns. In other words, sampling on the image states the size of the pixels (dots) in the image, and quantization states the value of the brightness level expressed in grayscale values ??according to the number of binary bits used by the machine, in other words quantization in the image represents the number of colors in the image. It is very important in securing digital images from parties who do not have access rights is very important. If important information in the form of digital images falls into the wrong hands, it will cause unwanted things, for example image manipulation in a negative form and can harm the owner of the image. In solving this problem, the author uses the ElGamal method which is used to maintain the security of the data by calculating the discrete logarithm of a group of prime integers in which the multiplication operation is carried out and combining it with the Double Playfair Cipher method to encode the image encryption and the ElGamal Algorithm to encrypt the key. from Double Playfair Cipher. The image is first encrypted using the Double Playfair Cipher Algorithm, then the Double Playfair key is encrypted using the ElGamal Algorithm. The result of testing the designed application is the formation of a public key and a private key which is carried out in encrypting and decrypting an image file so that the exchange of information in the form of digital images can be carried out safely.
Downloads
References
Sadikin, Rifki, Kriptografi untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java. Yogyakarta : Andi, 2012
Munir Rinaldi, Kriptografi, Bandung : Informatika, 2006
A Widyartono, Algoritma Elgamal Untuk Enkripsi Data Menggunakan Gnupg. Jurnal Teknologi Dan Informatika (Teknomatika) 1(1): 29-35, 2011
Ahmad Syawqi Lubis, Analisis Perbandingan Metode Playfair Cipher Dan Elgamal Pada Kriptografi Citra. Skripsi.Universitas Sumatera Utara, 2015
Wiwin Agustini Lubis, Penyandian Data Teks Dengan Algoritma Elgamal Dan Algoritma Kompresi Data Dengan Algoritma Elias Gamma Code. Skripsi.Universitas Sumatera Utara, 2015
Kromodimoeljo, Teori dan Aplikasi Kriptografi, Jakarta : SPK IT Consulting, 2009
Munir Rinaldi, Pengolahan Citra digital dengan Pendekatan Algo, Bandung : Informatika, 2006
M. Taufiq, Penerapan Algoritma Kriptografi Elgamal Untuk Pengaman File Citra, Jurnal EECCIS Vol. IV, No.1, Hal. 8-11, 2010
Lubis, Ahmad Syawqi., Analisis Perbandingan Metode Playfair Cipher Dan Elgamal Pada Kriptografi Citra. Skripsi.Universitas Sumatera Utara, 2015
Hendrayudi, Microsoft Visual Basic 2008, Bandung : Satu Nusa, 2011
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Kriptografi Hybrid Algoritma Elgamal Dan Double Playfair Cipher Dalam Pengamanan File Jpeg Berbasis Dekstop
ARTICLE HISTORY
Issue
Section
Copyright (c) 2021 Irwansyah Putra Sinaga

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


