PERBANDINGAN WAKTU ENKRIPSI ANTARA METODE ELECTRONIC CODEBOOK (ECB) DAN CHIPHER BLOCK CHAINING (CBC) DALAM ALGORITMA BLOWFISH
DOI:
https://doi.org/10.23887/jik.v5i1.3056Keywords:
Ciptography, Blowfish Algorithm, ECB Method, CBC MethodAbstract
Along with the development of the world of technology and information, cryptography becomes very important because cryptography is widely used to maintain the confidentiality and security of information. Optimization of the work of cryptography, needs to be supported by supporting algorithms. The development of supporting algorithms for cryptography has been very much developed and implemented. The block chipper algorithm was developed in line with developments in the technological era. The discovery of the Blowfish algorithm began to be analyzed again so that the longer the algorithm began to be accepted as an encryption algorithm that has a high level of security. In implementing the blowfish algorithm requires a large memory so that the utilization of large memory will have an impact on the execution time of the algorithm. Based on the results of the implementation and testing of the blowfish algorithm method, the ECB method requires a faster time to do text encryption when compared to using the CBC method. So that this can be taken into consideration in the selection of the right method for using the blowfish algorithm.References
Adhitya Randy. Studi dan Perbandingan Algoritma Blowfish dan Twofish.Laboratorium Ilmu dan Rekayasa Komputasi Progam Studi Teknik Informatika, Institut Teknologi Bandung 2010.
Jawahar Thakur, Nagesh Kumar. 2011. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis. International Journal of Emerging Technology and Advanced Engineering. ISSN 2250-2459, Volume 1, Issue 2, December 2011
Mollin, R. A. 2007. An Introduction to Cryptography. 2nd ed. Florida: Chapman & Hall/CRC.
Dimas,Herlina.2015 Analisis Perbandingan Kinerja Algoritma Blowfish dan Algoritma Twofish Dalam Peoses Enkripsi dan Deskripsi. Fakultas Ilmu Komputer Universitas Dehasen Bengkulu.2015
Jawahar Thakur, Nagesh Kumar. 2011. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis. International Journal of Emerging Technology and Advanced Engineering. ISSN 2250-2459, Volume 1, Issue 2, December 2011
Candra Alim Sutanto. 2009Penggunaan Algoritma Blowfish Dalam Kriptografi. Jurnal Teknologi Informasi. Jakarta : Teknik Informatika ITB.
Munir, Rinaldi (2004). Bahan Kuliah IF5054 Kriptografi.Departemen Teknik Informatika, Institut Teknologi Bandung.