Penerapan Algoritma Gost Dan Mode Output Feedback Untuk Tingkat Keamanan Citra Digital
DOI:
https://doi.org/10.47065/jimat.v1i4.128Keywords:
Cryptography; Images; GOST; Output Feedback (OFB); Client-ServerAbstract
Digital images that are private and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if it is distributed over the internet such as chat-based applications, WhatsApp and e-mail media. The image that is sent is sometimes an image that is confidential and must be protected. In order to maintain the security of digital images, cryptographic techniques can be used. Cryptographic techniques can secure digital images by changing the pixel values ??of the digital image so that it produces a different pixel value from the original image to be secured. In this study, the algorithm used is the GOST algorithm by adding the OFB technique to optimize the GOST key, and the encryption results can be sent via an application that will be designed with a client-server model. Creating a client-server-based encryption and decryption software application, aimed at transferring digital data in the form of a plain image that has been encrypted using the GOST algorithm, and can be distributed locally using an IP address connected to the same network on the sending and receiving computers (client-server)
Downloads
References
M. Winafil , S. Sinurat, Ta and T. Zebua, "IMPLEMENTASI ALGORITMA ADVANCED ENCRYPTION STANDARD DAN TRIPLE DATA ENCRYPTION STANDARD UNTUK MENGAMANKAN CITRA DIGITAL," KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), vol. 2, p. 450, 2018.
J. Jenitra, A. U. Wibowo and R. P. Sari, "Implementasi Aplikasi Pengiriman File pada Protokol DTN Berbasis Web," Jurnal Aksara Komputer Terapan, vol. 3, 2014.
S. Wahyuni, B. O. Sinaga, D. Almahera and I. Saputra, "Pengamanan File Docx Menerapkan Algoritma Gronsfeld," Seminar Nasional Teknologi Komputer & Sains (SAINTEKS, pp. 415-419, 2020.
SYLVIANI, "Pengembangan Algoritma Kriptografi GOST (Gosudarstvenny Standart) untuk Peningkatan Keamanan dalam Penyandian Data," Universitas Telkom, Bandung, 2011.
R. Munir and C. Lung, "STUDI DAN IMPLEMENTASI ADVANCED ENCRYPTION STANDART DENGAN EMPAT MODE OPERASI BLOCK CIPHER," Makalah Seminar Tugas Akhir Bandung : Departemen Teknik Informatika ITB, 2005.
R. Sadikin, Kriptografi untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java, T. A. Prabawati, Ed., Yogyakarta, Jawa Tengah: C.V ANDI OFFSET (Penerbit Andi), 2012, p. 218.
R. Munir, Kriptografi, Bandung: INFORMATIKA, 2006, p. 2.
R. Munir, "Tujuan Kriptografi," in Kriptografi, Bandung, Informatika Bandung, 2006, p. 9.
M. Amelia, 28 April 2014. [Online]. Available: https://meiilinuxer.wordpress.com/2014/04/28/operator-shift-right-dan-shift-left/.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Penerapan Algoritma Gost Dan Mode Output Feedback Untuk Tingkat Keamanan Citra Digital
ARTICLE HISTORY
Issue
Section
Copyright (c) 2021 Sri Wahyuni, Surya Darma Nasution, Taronisokhi Zebua

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).













