The Application Of Encryption And Decryption To The Delivery Of Text Messages Using The Rc4 Algorithm (Rivest Code 4) Utilizes The Lsb (Least Of Significant Bit) Algorithm As An Insertion Into The Image
DOI:
https://doi.org/10.55227/ijhet.v1i2.15Keywords:
Cryptography, Image, LSB, Message, RC4, Stegnography.Abstract
The use of image media information has several disadvantages, one of which is that it is easy to manipulate by certain parties with the help of technology that is developing today. Efforts that can be made in improving the security of the transmission of image information are cryptography, which is the science and art of keeping messages safe. In this study, the RC4 (Rivest Code 4) and LSB (Least Of Significant Bit) stegnography methods were applied which aimed to obtain a stronger cipher by inserting messages into the image so that it was difficult to intercept. RC4 (Rivest Code 4) algorithm for encrypting and decryption, LSB (Least Of Significant Bit) stegnography used to decode and decode images. The results of this study show that by applying RC4 (Rivest Code 4) and LSB Stegnography (Least Of Significant Bit) can secure messages inserted into the image and secure keys for data needs. The encoding and decoding process time is influenced by the number of messages that will be kept secret.
Downloads
References
Ardiansyah, A., & Kurniasih, M. (2018). Concealment of Secret Messages On Digital Images With Steganograpi Technique Using Least Significant Bit Method. XIII(November), 96–101.
Darwis, D. (2016). Implementation Of Least Significant Bit Steganography Techniques (LSB) And Compression For Securing Electronic Mail Sending Data. Journal of Technoinfo, 10(2), 32. https://doi.org/10.33365/jti.v10i2.8
Mukhtar, H. (2018). Cryptography For Data Security. Yogyakarta: CV. MAIN BOB.
Kusniyati, H., Diansyah, S., Yusuf, R., Informatics, J., Computer, F. I., & Buana, U. M. (2018). Application of the rivert code 4 (rc 4) algorithm to document cryptographic applications. 11(1), 38–47.
Minarni, M., & Fernando, A. G. (2020). IMPLEMENTATION OF THE END OF FILE (EoF) ALGORITHM ON IMAGE STEGANOGRAPHY. TechnoIf Journal, 8(1), 25. https://doi.org/10.21063/jtif.2020.v8.1.25-31
Nurdin, A. P. N. (2017). Cryptographic Analysis and Implementation of Confidential Messages. Jesik, 3(1), 1–11. nnurdin69@gmail.com
Prabowo, D. A., & Abdullah, D. (2018). Object Detection and Calculation Based on Color Using Color Object Tracking. Pseudocode, 5(2), 85–91. https://doi.org/10.33369/pseudocode.5.2.85-91
Saragi, D. R., Gultom, J. M., Tampubolon, J. A., & Gunawan, I. (2020). Securing Text File Data (Word) Using RC4 Algorithm. Journal of Computer Systems And Informatics (JSON), 1(2), 114. https://doi.org/10.30865/json.v1i2.1745
Simatupang, J., & Sianturi, S. (2019). Design of Bus Ticket Booking Information System On Po. Handoyo Based Online. Intra-Tech, 3, 16-18.
Sugiarti, Y. (2013). UML Analysis and Design (Unifed Modeling Language). Graha Ilmu, Yogyakarta
Wahana, K. (2013). Visual Basic 2012 Programming (Hernita P ed.). (A. O. C.V, Ed.) Semarang: Computer Rides. Retrieved 2013
Zebua, T., & Ndruru, E. (2017). Digital Image Security Based on Algorithm Modifications Rc4. 4(4), 275–282. https://doi.org/10.25126/jtiik.201744474