Sistem Pengamanan Anonym dengan Menggunakan Algoritma Kriptografi ElGamal

  • Ni Komang Ayu Sri Anggreni Udayana
  • Linawati Linawati Universitas Udayana
  • Nyoman Putra Sastra Universitas Udayana

Abstract

Reporting on act of domestic violence to Integrated Services Center for Woman and Children (Pusat Pelayanan Terpadu Pemberdayaan Perempuan dan Anak (P2TP2A)) Kota  Denpasar city is kind of sensitive and vulnerable data to tapping. As a result, security guarantee for the reporter  is needed to protect their identity. Security guarantee with anonym reporting system, which uses EIGamal cryptographic algorithm for encryption process and description process.  EIGamal cryptographic algorithm is one of asymmetric cryptography which consist of  3 processes, that are process  of generate key, encryption  process and description process  On this security system identity of the reporter will be protected through  process of authentication, authorization, and encryption. In this study the researcher uses Android platform and EIGamal cryptographic algorithm for encryption and description, Firebase Auth  for authentication, Firebase Rules for authorization and Avalanche Effect  for knowing the quality of cryptographic algorithm. The result of the trials  which used 10 different ciphet texts of avalanche effect is 58,2%. That result can be categorized as good because a good result of avalanche effect.

Downloads

Download data is not yet available.

References

[1] Al-Anshori, Faqihuddin., Aribowo, Eko. 2014. Impelemtasi Algoritma Kriptografi Kunci Publik ElGamal Untuk Proses Enkripsi dan Dekripsi Guna Pengamanan File Data. Jurnal Sarjana Teknik Informatika, Vol.2 No.2
[2] Himawan, Cindy., Wibowo, Toni., Sulistyo, Budi. 2016. Studi Perbandingan Algoritma RSA dan Algoritma El-Gamal. Presiden University.
[3] Sharma, Ankush., Attri, Jyoti., Devi, Aarti., Sharma, Pratibha. 2014. Implementation & Analysis of RSA and ElGamal Algorithm. Asian J. of Adv. BasicSci : 2(3). 125-129
[4] Mulya, Megah., 2013. Perbandingan Kecepatan Algoritma Kriptografi Asimetri. Journal of Research in Computer Science and Applications, Vol.1 No.2
[5] Karima, Aisyatul., Handoko, L. Budi., Saputro, Ari. 2017. Pemfaktoran BilangannPrima padanAlgoritma ElGamal untuk KeamanannDokumennPDF. JNTETI, Vol.6, No.3
[6] Triase. 2015. Kriptografi ElGamal Menggunakan Metode Mersenne. Jurnal Ilmiah “Integritas”. Vol.1 No.4
[7] Kabetta, Herman. 2017. Analisis Kompleksitas Waktu Algoritma Kriptografi ElGamal dan Data Encryption Standard. Jurnal Teknikom. Vol.1 No.1 ISSN: 2598-294X
[8] Parmadi, B. (2017).nImplementasinAlgoritma Kriptografi ElgamalnpadanDatanText, JournalnofnInformationnand Technology, Vol.05 No 01.
[9] Vishwakarma, Manila., Jain Sourabh. (2018). An Efficient Cryptosystem to Perform Encryption and Decryption of Data.
[10] Djellalbia, Amina., Badache, Nadjib., Benmeziane, Souad., Bensimessaoud, Sihem. 2016. Anonymous Authentication Scheme in e-Health Cloud Environment. 11th International Conference for Internet Technology and Secured Transactions (ICITST). 47-52
[11] Nivedita Bisht dan Sapna Singh.. “A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms”. International Journal of Innovative Research in Science Engineering and Technology Vol. 4 Issue 3. 2015.
Published
2019-06-30
How to Cite
ANGGRENI, Ni Komang Ayu Sri; LINAWATI, Linawati; SASTRA, Nyoman Putra. Sistem Pengamanan Anonym dengan Menggunakan Algoritma Kriptografi ElGamal. Majalah Ilmiah Teknologi Elektro, [S.l.], v. 18, n. 2, p. 197--202, june 2019. ISSN 2503-2372. Available at: <https://ojs.unud.ac.id/index.php/mite/article/view/48704>. Date accessed: 14 nov. 2024. doi: https://doi.org/10.24843/MITE.2019.v18i02.P07.