PERBANDINGAN WAKTU ENKRIPSI ANTARA METODE ELECTRONIC CODEBOOK (ECB) DAN CHIPHER BLOCK CHAINING (CBC) DALAM ALGORITMA BLOWFISH

Ida Ayu Widyantari Arnawa Putu Eka Widastra Hary C. A. A. Gede Bimantara Putra

Abstract


Along with the development of the world of technology and information, cryptography becomes very important because cryptography is widely used to maintain the confidentiality and security of information. Optimization of the work of cryptography, needs to be supported by supporting algorithms. The development of supporting algorithms for cryptography has been very much developed and implemented. The block chipper algorithm was developed in line with developments in the technological era. The discovery of the Blowfish algorithm began to be analyzed again so that the longer the algorithm began to be accepted as an encryption algorithm that has a high level of security. In implementing the blowfish algorithm requires a large memory so that the utilization of large memory will have an impact on the execution time of the algorithm. Based on the results of the implementation and testing of the blowfish algorithm method, the ECB method requires a faster time to do text encryption when compared to using the CBC method. So that this can be taken into consideration in the selection of the right method for using the blowfish algorithm.

Keywords


Ciptography, Blowfish Algorithm, ECB Method, CBC Method

Full Text:

PDF

References


Adhitya Randy. Studi dan Perbandingan Algoritma Blowfish dan Twofish.Laboratorium Ilmu dan Rekayasa Komputasi Progam Studi Teknik Informatika, Institut Teknologi Bandung 2010.

Jawahar Thakur, Nagesh Kumar. 2011. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis. International Journal of Emerging Technology and Advanced Engineering. ISSN 2250-2459, Volume 1, Issue 2, December 2011

Mollin, R. A. 2007. An Introduction to Cryptography. 2nd ed. Florida: Chapman & Hall/CRC.

Dimas,Herlina.2015 Analisis Perbandingan Kinerja Algoritma Blowfish dan Algoritma Twofish Dalam Peoses Enkripsi dan Deskripsi. Fakultas Ilmu Komputer Universitas Dehasen Bengkulu.2015

Jawahar Thakur, Nagesh Kumar. 2011. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis. International Journal of Emerging Technology and Advanced Engineering. ISSN 2250-2459, Volume 1, Issue 2, December 2011

Candra Alim Sutanto. 2009Penggunaan Algoritma Blowfish Dalam Kriptografi. Jurnal Teknologi Informasi. Jakarta : Teknik Informatika ITB.

Munir, Rinaldi (2004). Bahan Kuliah IF5054 Kriptografi.Departemen Teknik Informatika, Institut Teknologi Bandung.




DOI: https://doi.org/10.23887/jik.v5i1.3056

Refbacks

  • There are currently no refbacks.


Diterbitkan oleh:

UNIVERSITAS PENDIDIKAN GANESHA


Jl. Udayana, Kampus Tengah, Singaraja-Bali
Kode Pos 81116
Telp. 0362-22570
Homepage: http://www.undiksha.ac.id


JURNAL ILMU KOMPUTER INDONESIA Undiksha indexed by:

     

Creative Commons License