Implementasi Enkripsi dan Otentikasi Transmisi Data ZeroMQ Menggunakan Advanced Encryption Standard

  • I Made Sukarsa Universitas Udayana
  • I Made Rama Pradana The University of Udayana
  • Putu Wira Buana The University of Udayana
Keywords: authentication, encryption, parallel pipeline, socket, zeromq

Abstract

Communication via sockets is used to transmit information between applications or between processes over network or locally. ZeroMQ is a library for sending messages using sockets that are quite well known. Talking about sending data, message security is an important part that needs to be taken into account, especially when sending data over a network. ZeroMQ sends messages openly without securing the messages sent. This is evidenced by research which states that ZeroMQ does not have a security layer for sending messages over the network and direct observation of message packets using the wireshark application. Therefore, this study creates a method of securing and authenticating message delivery using AES (Advanced Encryption Standard) CBC (Cipher Block Chaining) mode combined with an authentication method. The AES CBC mode was chosen because it is faster than other methods and has strong encryption. This encryption and authentication are used so that the sender and recipient of the message are both valid senders and recipients so that no message changes during message delivery and messages can only be opened by the message recipient and the sender of the message. Tests are conducted to measure the effect of encryption and authentication on message delivery performance. Based on the tests conducted, there is an increase of 7% from normal delivery speed and the potential for messages is not up to 0.3% - 1.5%.

Downloads

Download data is not yet available.

References

R. L. Maata, R. Cordova, B. Sudramurthy, and A. Halibas, “Design and Implementation of Client-Server Based Application Using Socket Programming in a Distributed Computing Environment,” 2017 IEEE Int. Conf. Comput. Intell. Comput. Res. ICCIC 2017, no. December, 2018.

N. Ivaki, N. Laranjeiro, and F. Araujo, “A survey on reliable distributed communication,” J. Syst. Softw., vol. 137, no. October, pp. 713–732, 2018.

L. Magnoni, “Modern messaging for distributed sytems,” J. Phys. Conf. Ser., vol. 608, no. 1, 2015.

M. Rajcan, “Securing Data in Motion in ZeroMQ and Data at Rest on Windows Platform,” 2017.

A. Muhammad Abdullah, “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data,” Cryptogr. Netw. Secur., no. June, 2017.

S. Patil and R. Patil, “Faster Transfer of AES Encrypted Data over Network,” vol. 5, no. 6, pp. 7674–7676, 2014.

S. Parmar and K. . Dave, “Implementation of Data Encryption and Decryption Algorithm for Information Security,” Int. J. Adv. Sci. Eng. Technol., vol. 1, no. 2, 2013.

P. Mahajan and A. Sachdeva, “A Study of Encryption Algorithms AES, DES and RSA for Security,” Glob. J. Comput. Sci. Technol. Network, Web Secur., vol. 13, no. 15, 2013.

Vaidehi and Rabi, “Design and Analysis of AES-CBC Mode for High Security Applications,” Second Int. Conf. Curr. Trends Eng. Technol., 2014.

N. A. Lal, S. Prasad, and M. Farik, “A Review Of Authentication Methods,” vol. 5, no. 11, pp. 246–249, 2016.

A. Purwinarko and W. Hardyanto, “A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications,” Sci. J. Informatics, vol. 5, no. 1, p. 80, 2018.

Ravikumara and Lakshmikanth, “Implementation of Hop-By-Hop Encryption Protocol for Transmission of Motion Control Data over Public Network Using Sors,” Int. J. Innov. Res. Adv. Eng., vol. 2, no. 4, pp. 221–224, 2015.

A. F. Osuolale, “Secure Data Transfer Over the Internet Using Image CryptoSteganography,” Int. J. Sci. Eng. Res., vol. 8, no. 12, pp. 1115–1121, 2017.

M. R. Joshi and R. A. Karkade, “Network Security with Cryptography,” Int. J. Comput. Sci. Mob. Comput., vol. 41, no. 1, pp. 201–204, 2015.

ZeroMQ, “ZGuide.” [Online]. Available: http://zguide.zeromq.org/. [Accessed: 20-Aug-2020].

D. Lombu, S. D. Tarihoran, and I. Gulo, “Kombinasi Mode Cipher Block Chaining Dengan Algoritma Triangle Chain Cipher Pada Penyandian Login Website,” J-SAKTI (Jurnal Sains Komput. dan Inform., vol. 2, no. 1, p. 1, 2018.

Published
2020-12-26
How to Cite
I Made Sukarsa, I Made Rama Pradana, & Putu Wira Buana. (2020). Implementasi Enkripsi dan Otentikasi Transmisi Data ZeroMQ Menggunakan Advanced Encryption Standard. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 4(6), 1149 -. https://doi.org/10.29207/resti.v4i6.2581
Section
Artikel Rekayasa Sistem Informasi