RC4 Cryptography Implementation Analysis on Text Data

Agung Susilo Yuda Irawan, Adi Rizky Pratama, Ryan Antono

Abstract


Security and confidentiality have become very important and continue to grow. In recent years, there have been several cases involving data security, such as the leaking of Facebook user account information. This is certainly a significant issue in the world of information technology and even the world of entrepreneurship because it involves one of the young entrepreneurs, Mark Zuckerberg. Main problem in this case is data security. who can know information and who should not know information. To overcome such things, research is made in the field of data and information security by analyzing one of the encryption and decryption techniques, namely RC4 cryptography. This study explains how RC4 cryptography works, the advantages and disadvantages of RC4 cryptography, and the effectiveness of RC4 cryptography. RC4 (River Ciper 4) is a decryption encryption technique that uses a key as a reference. The process consists of KSA, PRGA, and XOR. To find out the usefulness of RC4 cryptography, in this study, encryption and decryption were carried out on text data. There are several advantages and disadvantages to RC4 cryptography from a technical point of view. The advantage that needs to be underlined is that this RC4 cryptography uses a certain key as a reference, things like this can provide convenience to the encryption maker but can also be a threat. as a result RC4 can hide information very well while the secret key is not known by others. In addition to being used in text data, this cryptography may be used for other data such as audio and video.

Keywords


cryptography, RC4, ASCII, text..

Full Text:

PDF

References


I. Halik and Y. Prayudi, “Studi dan Analisis Algoritma Rivest Code 6 (RC6) dalam Enkripsi/Dekripsi Data,” Snati, vol. 6, no. D, 2005, [Online]. Available: http://journal.uii.ac.id/index.php/Snati/article/view/1402.

and T. H. D. Seftyanto, M. Apriani, “No Title,” 2012, [Online]. Available: https://eprints.uny.ac.id/10106/1/P - 94.pdf.

H. Pertiwi, “Teori Algoritma,” vol. 1, pp. 1–10, 2014.

W. H. Haji and S. Mulyono, “Implementasi Rc4 Stream Cipher Untuk Keamanan Basis Data,” Semin. Nas. Apl. Teknol. Inform., vol. 2012, pp. 15–16, 2012.

R. Munir, Kriftografi. Bandung: Institut Teknologi Bandung, 2006.

R. K. P. Pratama and F. Latifah, “Implementasi enkripsi dekripsi pesan teks menggunakan model Julis Caesar berbasis Object Oriented Programme,” J. Techno Nusa Mandiri, vol. XI, no. 1, pp. 17–26, 2014, [Online]. Available: http://ejournal.nusamandiri.ac.id/index.php/techno/article/view/167.

J. Komputasi, “Implementasi Enkripsi Dan Deskripsi Dengan Metode,” vol. 5, no. 2, pp. 38–44, 2017.

P. Kriptografi and D. A. N. Pemakaianya, “2016,” no. May, 2016.

Suhardi, “Aplikasi Kriptografi Data Sederhana Dengan Metode Exlusive-or (Xor),” J. Teknovasi, vol. 03, no. 2, pp. 23–31, 2016.

Karthik, Chinnasamy, and Deepalakshmi, “Hybrid cryptographic technique using OTP:RSA,” Proc. 2017 IEEE Int. Conf. Intell. Tech. Control. Optim. Signal Process. INCOS 2017, vol. 2018-February, no. November 2020, pp. 1–4, 2018, doi: 10.1109/ITCOSP.2017.8303131.

M. Edy Purnomo, W. Priyono, S. Sari, R. Ambarwati, and A. Wulandari, “Implementasi Algoritma Kriptografi RC4 Pada DSP TMS320C6713 Sebagai Pendukung Sekuritas Jaringan Komunikasi Voice Over Internet Protocol (VoIP),” J. EECCIS, vol. 6, no. 2, p. pp.183-188, 2012.

E. L. Hakim and F. H. Utami, “Aplikasi Enkripsi Dan Deskripsi Data Menggunakan Algoritma Rc4,” vol. 10, no. 1, pp. 1–7, 2014.

M. Awaludin, “Penerapan Algoritma Rc4 Pada Operasi Xor Untuk Keamanan Pesan Pada Smartphone Berbasis Web,” J. Sist. Inf. Univ. Suryadarma, vol. 4, no. 1, pp. 16–22, 2014, doi: 10.35968/jsi.v4i1.71.

T. D.B.Weerasinghe, “Analysis of a Modified RC4 Algorithm,” Int. J. Comput. Appl., vol. 51, no. 22, pp. 12–16, 2012, doi: 10.5120/8341-1617.

M. M. Hammood, K. Yoshigoe, and A. M. Sagheer, “RC4-2S: RC4 stream cipher with two state tables,” Lect. Notes Electr. Eng., vol. 253 LNEE, no. January, pp. 1




DOI: http://dx.doi.org/10.38101/sisfotek.v11i2.408

Refbacks

  • There are currently no refbacks.


 

JURNAL SISFOTEK GLOBAL

Organized by: Research Center and Community Development
Published by: Institut Teknologi dan Bisnis Bina Sarana Global
Jl. Aria Santika No.43A, Margasari, Kec. Karawaci, Kota Tangerang, Banten 15114
Phone. +62 552 2727
Email: lppm@global.ac.id

INDEXED BY:

   


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License..
Based on a work at https://journal.global.ac.id/index.php/sisfotek/index.