Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen
DOI:
https://doi.org/10.47065/jimat.v1i4.130Keywords:
Cryptography; XTEA; LCG; Document FilesAbstract
Confidential document files must have security both when the file process is sent or stored in the stroge media. This is done so that the confidential document file is not known by someone who does not have authority over the file, or to avoid loss if the file falls into the wrong hands. In order to achieve this, a document file security technique is needed that can convert document file data into unrecognized data. One of the techniques that can be used is cryptography. Cryptography makes use of algorithms to encode document files with an encryption process, and restore document files with a decryption process. One of the algorithms that can be used is the XTEA algorithm. XTEA divides the document file string into 2 parts, namely AL 32 bit and BL 32 bit. The weakness of the XTEA algorithm when carrying out the encryption or decryption process with repeated key scheduling so that it is not effective in optimizing the security of encrypted document files, therefore in this study the Linear Congruential Generator (LCG) method is added to generate XTEA keys. LCG has values ??a, c, m and X0 which triggers to get the XTEA key. So that in the process of distributing encrypted document files, the key sent is the LCG trigger value in the form of a, c, m and X0, if the value is known by the attacker, the encrypted document file cannot be returned. So that the results of the XTEA encryption algorithm with key optimizer based on the LCG method produce a document file cipher that is more optimal in security
Downloads
References
Murdani, "Perancangan Aplikasi Keamanan Data Teks Menggunakan Algoritma Merkle Hellman Knapsack," Jurnal Pelita Informasi, vol. 16, no. 3, pp. 302-305, 2017.
Fathima’ruf,”Konsep Penggabungan Alogritma Vigenere Dengan XTEA Blok Chiper Untuk Meningkatkan Keamanan Dokomen Dalam Matakuliah Kriptografi”,Jurnal Ilimiah Ilmu Pendidikan, Vol.2, No.1, pp.158-165, 2019
Sistem Pengkodean Data Pada File teks Untuk Keamanan Informasi Dengan Menggunakan Metode Skipjack, Jurnal Computech & Bisnis, Vol.12, No.1, pp.59-72, 2018.
D. Biantara, "Modifikasi Metode Linear Congruential Generator Untuk Optimalisasi Hasil Acak," Seminar Nasional Informatika, pp. 182-186, 2015.
R.Aulia, A.Zakir dan M.Zulhafiz, “Penerapan Algoritma One Time Pad& Linear Congruential Generator Untuk Keamanan Pesan Teks”, Jurnal Nasional Informatika, Vol.4, No.1, pp.38-41, 2019
E. Setyaningsih, Kriptografi & Implementasi Menggunakan Matlab, Yogyakarta: Andi. 2015
A.A. Ibrahim, "Perancangan Pengamanan Data Menggunakan Algoritma AES (Advanced Encryption Standard)", Teknik Informatika STMIK Antar Bangsa, vol. III, pp.53-60, 2017
K.William,"Studi Mengenai Tiny Encryption Algorithm (TEA) dan Turunan Turunannya (XTEA dan XXTEA), Institut Teknologi Bandung, 2015.
Wikipedia, (2018,nov.2). XTEA [online]. https://en.wikipedia.org/wiki/XTEA
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen
ARTICLE HISTORY
Issue
Section
Copyright (c) 2021 Berliana Oktaviani Sinaga, Sinar Sinurat, Taronisokhi Zebua

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).













