Kriptografi Audio MP3 Menggunakan RSA dan Transposisi Kolom

  • Cinantya Paramita Universitas Dian Nuswantoro
  • Usman Sudibyo Universitas Dian Nuswantoro
Keywords: MP3, RSA, transposition, cryptography

Abstract

Mp3 is one form of audio file extension that is widely used today. With a variety of uses in a variety of mp3 systems become one of the audio extensions that are commonly found in technology systems of the Internet of Things era. However, with the many uses of the .mp3 file extension, there is a new problem, namely the security of the data itself. From these problems, the author aims to examine the security of the mp3 file by designing cryptographic science-based applications. The cryptographic algorithm used in the application is a combination of the asymmetric RSA 2048 algorithm and symmetric columnic transpositions. RSA 2048 algorithm was chosen because it has a key length in accordance with NIST standards in securing data. By combining the two algorithms, the application system will have the ability to manage mp3 files and encrypt mp3 files with the results of data that cannot be played like mp3 files in general. This application system will be developed by prototype method which is the best method in developing a system with trial and error in algorithm development.

 

Downloads

Download data is not yet available.

References

N. A. Fauziah, E. H. Rachmawanto, D. Setiadi and C. A. Sari, "Design and Implementation of AES and SHA-256 Cryptography for Securing Multimedia File over Android Chat Application," in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, 2018.

O. G. Abood and S. K. Guirguis, "A Survey on Cryptography Algorithms," International Journal of Scientific and Research Publications, vol. 8, no. 7, pp. 495- 516, 2018.

R. D. Ardy, O. R. Indriani, C. A. Sari, D. Setiadi and E. H. Rachmawanto, "Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5)," in International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS) 2017, Yogyakarta, 2018.

E. J. Kusuma, C. A. Sari, E. H. Rachmawanto and D. Setiadi, "A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography," Journal of ICT Research and Applications, vol. 12, no. 2, pp. 103-122, 2018.

N. N. Diarse and K. J. Bendi, "Penerapan Algoritma RSA pada Sistem Kriptografi File Audio MP3," Jurnal Hoaq Teknologi Informasi, vol. 7, no. 2, pp. 567 -575, 2016.

T. Z. Nwe and S. W. Phyo, "Performance Analysis of RSA and ElGamal for Audio Securit," International Journal of Scientific Engineering and Technology Research, vol. 3, no. 11, pp. 2494-2498, 2014.

A. G. Khan, S. Basharat and M. U. Riaz, "Analysis of asymmetric cryptography in information security based on computational study to ensure confidentiality during information exchange," International Journal of Scientific & Engineering Research, vol. 9, no. 10, pp. 992-999, 2018.

A. Jawahir and H. Haviluddin, "An audio encryption using transposition method," International Journal of Advances In Intelligent Informatics, vol. 1, no. 2, pp. 98-106, 2015.

S. Nisha and M. Farik, "RSA Public Key Cryptography Algorithm – A Review," International Journal of Scientific & Technology Research, vol. 6, no. 7, pp. 187-191, 2017.

S. F. Yousif, "Encryption And Decryption of Audio Signal Based On Rsa Algorithn," International Journal of Engineering Technologies and Management Research, vol. 5, no. 7, pp. 57-64, 2018.

A. Fauzi, Novriyenni, Y. Maulita and A. M. Pardede, "Analisis Hybrid Cryptosystem Algoritma Algoritma RSA dan Triple Des," Jtik (Jurnal Teknik Informatika Kaputama), vol. 1, no. 2, pp. 36-44, 2017.

Zhen, P, Zhao, G, Min, L, Jin, X, "Chaos-based image encryption scheme combining DNA coding and entropy," Multimed Tools Appl, vol. 75, pp. 6303–6319, 2016.

Published
2021-06-19
How to Cite
Paramita, C., & Usman Sudibyo. (2021). Kriptografi Audio MP3 Menggunakan RSA dan Transposisi Kolom. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 5(3), 483 - 488. https://doi.org/10.29207/resti.v5i3.2996
Section
Artikel Teknologi Informasi