Implementasi Enkripsi dan Otentikasi Transmisi Data ZeroMQ Menggunakan Advanced Encryption Standard
Implementation of ZeroMQ Data Transmission Encryption and Authentication Using Advanced Encryption Standard
Abstract
Communication via sockets is used to transmit information between applications or between processes over network or locally. ZeroMQ is a library for sending messages using sockets that are quite well known. Talking about sending data, message security is an important part that needs to be taken into account, especially when sending data over a network. ZeroMQ sends messages openly without securing the messages sent. This is evidenced by research which states that ZeroMQ does not have a security layer for sending messages over the network and direct observation of message packets using the wireshark application. Therefore, this study creates a method of securing and authenticating message delivery using AES (Advanced Encryption Standard) CBC (Cipher Block Chaining) mode combined with an authentication method. The AES CBC mode was chosen because it is faster than other methods and has strong encryption. This encryption and authentication are used so that the sender and recipient of the message are both valid senders and recipients so that no message changes during message delivery and messages can only be opened by the message recipient and the sender of the message. Tests are conducted to measure the effect of encryption and authentication on message delivery performance. Based on the tests conducted, there is an increase of 7% from normal delivery speed and the potential for messages is not up to 0.3% - 1.5%.
Downloads
References
R. L. Maata, R. Cordova, B. Sudramurthy, and A. Halibas, “Design and Implementation of Client-Server Based Application Using Socket Programming in a Distributed Computing Environment,” 2017 IEEE Int. Conf. Comput. Intell. Comput. Res. ICCIC 2017, no. December, 2018.
N. Ivaki, N. Laranjeiro, and F. Araujo, “A survey on reliable distributed communication,” J. Syst. Softw., vol. 137, no. October, pp. 713–732, 2018.
L. Magnoni, “Modern messaging for distributed sytems,” J. Phys. Conf. Ser., vol. 608, no. 1, 2015.
M. Rajcan, “Securing Data in Motion in ZeroMQ and Data at Rest on Windows Platform,” 2017.
A. Muhammad Abdullah, “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data,” Cryptogr. Netw. Secur., no. June, 2017.
S. Patil and R. Patil, “Faster Transfer of AES Encrypted Data over Network,” vol. 5, no. 6, pp. 7674–7676, 2014.
S. Parmar and K. . Dave, “Implementation of Data Encryption and Decryption Algorithm for Information Security,” Int. J. Adv. Sci. Eng. Technol., vol. 1, no. 2, 2013.
P. Mahajan and A. Sachdeva, “A Study of Encryption Algorithms AES, DES and RSA for Security,” Glob. J. Comput. Sci. Technol. Network, Web Secur., vol. 13, no. 15, 2013.
Vaidehi and Rabi, “Design and Analysis of AES-CBC Mode for High Security Applications,” Second Int. Conf. Curr. Trends Eng. Technol., 2014.
N. A. Lal, S. Prasad, and M. Farik, “A Review Of Authentication Methods,” vol. 5, no. 11, pp. 246–249, 2016.
A. Purwinarko and W. Hardyanto, “A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications,” Sci. J. Informatics, vol. 5, no. 1, p. 80, 2018.
Ravikumara and Lakshmikanth, “Implementation of Hop-By-Hop Encryption Protocol for Transmission of Motion Control Data over Public Network Using Sors,” Int. J. Innov. Res. Adv. Eng., vol. 2, no. 4, pp. 221–224, 2015.
A. F. Osuolale, “Secure Data Transfer Over the Internet Using Image CryptoSteganography,” Int. J. Sci. Eng. Res., vol. 8, no. 12, pp. 1115–1121, 2017.
M. R. Joshi and R. A. Karkade, “Network Security with Cryptography,” Int. J. Comput. Sci. Mob. Comput., vol. 41, no. 1, pp. 201–204, 2015.
ZeroMQ, “ZGuide.” [Online]. Available: http://zguide.zeromq.org/. [Accessed: 20-Aug-2020].
D. Lombu, S. D. Tarihoran, and I. Gulo, “Kombinasi Mode Cipher Block Chaining Dengan Algoritma Triangle Chain Cipher Pada Penyandian Login Website,” J-SAKTI (Jurnal Sains Komput. dan Inform., vol. 2, no. 1, p. 1, 2018.
Copyright (c) 2020 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright in each article belongs to the author
- The author acknowledges that the RESTI Journal (System Engineering and Information Technology) is the first publisher to publish with a license Creative Commons Attribution 4.0 International License.
- Authors can enter writing separately, arrange the non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional repository, publication in a book, etc.), by acknowledging that the manuscript has been published for the first time in the RESTI (Rekayasa Sistem dan Teknologi Informasi) journal ;