Implementasi Algoritma Noekeon Untuk Mengamankan File Audio
DOI:
https://doi.org/10.47065/jimat.v2i2.143Keywords:
Cryptography; Securing; Audio Files; Noekeon AlgorithmAbstract
Along with the development of an increasingly advanced era, and supported by the development of very rapid information technology, especially in producing audio files, it can now be done with smartphone devices. With the application on smartphones with devices to make audio both for private and public. Audio files need to be secured with better security, in order to anticipate if the account is far from being in the hands of unauthorized people, one way to secure audio files is by using cryptographic techniques, with this technique, unauthorized people cannot see the information contained in the audio. the. One of the algorithms that can be used to secure audio files is the NOEKEON algorithm, Noekeon is a repeating block cipher with a block length and key length of 128 bits each, which consists of a simple round transformation application that repeats itself, followed by an output transformation. Noekeon has 16 rounds (Nr) iterations in each round four transformations are carried out, namely, Theta, shift offset consisting of two transformations Pi1 and Pi2 and gamma The advantages of the Noekeon algorithm do not limit the keys used or use these keys to exploit into cipher text and avalanche effects obtained meet the strict Avalanche criterion. If there is an error in one block cipher it cannot affect the other blocks
Downloads
References
A. H. Lubis, "Enkripsi Data Dengan Algoritma Kriptografi Noekeon," Journal of Computer Engineering System and Science, pp. 22-26, 2017.
J. Daemen, M. Peeters, G. V. Assche and V. Rijmen, "The Noekeon Block Cipher," Esat Cosic Kuleuven, Proton Worls Intl, Belgium, 2000.
D. Ariyus, Pengantar Ilmu Kriptografi Teori dan Analisis dan Implementasinya, Yogyakarta: Andi, 2008
R. Sadikin, Kriptografi Untuk Keamanan Jaringan dan Implementasinya Dalam Bahasa Java, A. Probawati, Ed., Yogyakarta: Andi, 2012
R. Munir, Kriptografi, Yogyakarta: Andi, 2006.
H. Mukhtar, Kriptografi Untuk Keamanan Data, Yogyakarta: Deepublish, 2018.
J. Hermawan, Analisa dan Desain Pemrograman Berorientasi Objek Dengan UML dan Visual Basic.Net, Yogyakarta: Andi, 2005
R. A. Sukamto and M. Shalahuddin, Rekayasa Perangkat Lunak, Yogyakarta: Andi, 2011
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma Noekeon Untuk Mengamankan File Audio
ARTICLE HISTORY
Issue
Section
Copyright (c) 2022 Tita Azwinar Sarumaha

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).