Kriptografi Advanced Encryption Standard (AES) Untuk Penyandian File Dokumen
Abstract
Abstrak. Advanced Encryption Standard (AES) adalah algoritma kriptografi yang menjadi standar algoritma enkripsi kunci simetris pada saat ini. Dalam algoritma kriptografi AES 128, 1blok plainteks berukuran 128 bit terlebih dahulu dikonversi menjadi matriks heksadesimal berukuran 4x4 yang disebut state. Setiap elemen state berukuran 1 byte. Proses enkripsi pada AES merupakan transformasi terhadap state secara berulang dalam 10 ronde. Setiap ronde AES membutuhkan satu kunci hasil dari generasi kunci yang menggunakan 2 transformasi yaitu subtitusi dan transformasi. Pada proses enkripsi AES mengunakan 4 transformasi dasar dengan urutan trasformasi subbytes, shiftrows, mixcolumns, dan addroundkey. Sedangkan pada proses dekripsi mengunakan invers semua transformasi dasar pada algoritma AES kecuali addroundkey dengan urutan transformasi invshiftrows, invsubbytes, addroundkey,dan invmixcolumns. Pada data teks, proses enkripsi diawali dengan mengkonversi teks menjadi kode ASCII dalam bilangan heksadesimal yang dibentuk menjadi matriks byte 4x4. Selanjutnya dilakukan beberapa trnsformasi dasar seperti subbytes, shiftrows, mixcolumns, dan addroundkey. Akan tetapi ketika melakukan trasformasi data yang diproses pada setiap trasformasi berupa data biner dari matriks heksadesimal. Kriptografi AES 128 bit memiliki ruang kunci 2128 yang merupakan nilai yang sangat besar dan dianggap aman untuk digunakan sehingga terhindar dari brute force attack.
Kata Kunci: AES, Penyandian file, Algoritma kunci simetris.
Abstract. (Cryptography Advanced Encryption Standard (AES) for File Document Encryption). Advanced Encryption Standard (AES) is a cryptographic algorithms as a standard symmetric key encryption algorithm that used in current time. AES 128 has 1 blok plaintext with 128 bit sized, where in the process of cryptographic algorithms, first the plaintext is converted into hexadecimal-sized 4 x 4 matrices called the state, where each element of state has 1 byte size. The process of encryption on AES is the transformation towards the state repeatedly in the 10th round. Each round of AES requires one key result of the key generation using 2 basic transformation, i.e. substitution and transformation. AES encryption using 4 transformation by the following sequence: subbytes, shiftrows, mixcolumns, and addroundkey. On the other hand, the process of decryption is using the inverse of all the basic transformation of AES algorithm, except addroundkey. Therefore, the sequence of transformation on the decription is invshiftrows, invsubbytes, invmixcolumns, and addroundkey. In the data text, the encryption process is initiated with convertion the data text into ASCII code in hexadecimal numbers that are molded into the matrix 4 x 4 bytes. Next, do some basic transformation such as subbytes, shiftrows, mixcolumns, and addroundkey. However, when performing the transformation, the processed data on every trasformation is in the form of binary data obtained from the hexadecimal matrix. AES 128 bit cryptography have room 2128 keys which is a tremendous value and is considered secure to use to avoid the brute force attack.
Keywords: AES, file Encryption, symmetric key algorithm.
Full Text:
PDF (Bahasa Indonesia)References
Munir, Rinaldi. Kriptografi. Bandung : Penerbit Informatika, 2006.
Sadikin, Rifki. Kriptografi Untuk Keamanan Jaringan. Yogyakarta: Penerbit Andi. 2012.
Stalling, Wiliams. Komputer Security And Cryptography. New Jersey: A Jhon Wiley&Sons, Inc. 2003.
E. Harahap, J. Wijekoon, R. Tennekoon, F. Yamaguchi, S. Ishida. Modeling of Router-based Request Redirection For Content Distribution Network. International Journal of Computer Applications, volume 76, issue 13, pp. 37-46. New York 76.13 (2013). DOI: 10.5120/13310-0857
Y. Permanasari, E. Harahap. Algoritma Data Encryption Standard (DES) Pada Electronic Code Book (ECB). Jurnal Matematika UNISBA, Vol. 6, No. 1. 2007. pp. 77-84.
R. Tennekoon, J. Wijekoon, E. Harahap, dan H. Nishi. Per-hop data encryption protocol for transmitting data securely over public netrwork. Procedia Computer Science. Volume. 32. 2014. pp. 965-972. DOI: 10.1016/i.procs.2014.05.519
R. Tennekoon, J. Wijekoon, E. Harahap, H. Nishi, E. Saito, S Katsura. Per hop data encryption protocol for transmission of motion control data over public networks. Proceeding Advanced Motion Control (AMC) on IEEE 13th International Workshop, Yokohama, Japan. 2014. Pp.128-133
DOI: https://doi.org/10.29313/jmtm.v15i1.4067
Refbacks
- There are currently no refbacks.
Copyright (c) 2018 Matematika
ISSN : 1412-5056 | E-ISSN 2598-8980
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Indexed by: