Design and Build Data Security Using Elliptic Curve Cryptography and Blowfish on IoT Tools in PDAM Companies
Citation
MLA Style:Bagus Miftah Rizqullah, Gusti Made Arya Sasmita, ST., MT, I Made Sunia Raharja, S.Kom.,M.CS "Design and Build Data Security Using Elliptic Curve Cryptography and Blowfish on IoT Tools in PDAM Companies" International Journal of P2P Network Trends and Technology 10.4 (2020): 16-21.
APA Style:Bagus Miftah Rizqullah, Gusti Made Arya Sasmita, ST., MT, I Made Sunia Raharja, S.Kom.,M.CS(2019). Design and Build Data Security Using Elliptic Curve Cryptography and Blowfish on IoT Tools in PDAM Companies. International Journal of P2P Network Trends and Technology, 10(4),16-21.
Abstract
PDAM (Perusahaan Daerah Air Minum) is a local government-owned company engaged in the distribution of clean water to the general public within the Indonesian local government. PDAM develops its technology and information systems specifically in the field of Internet of Things. The process handled is the prepaid PDAM transaction process which is carried out online. This prepaid PDAM transaction module really needs data security that can maintain the data transmission process on IoT devices. In this study, the design of a data security system using the PGP (Pretty Good Privacy) method is modified using the Eliptic Curve and BlowFish algorithms. The modified PGP method uses the SHA1 algorithm as a digital signature, Eliptic Curve cryptography is used as the Public Key encryption and Blow Fish cryptography is used as the symmetric encryption key. Attempted attacks with the man in middle attack cannot occur because the public key encryption uses the Eliptic Curve algorithm so it takes a very long hacking time
References
[1] Satriawan, I. W. D., Made, I. G., Sasmita, A., & Bayupati, I. P. A. (2016). Aplikasi Enkripsi Sms Dengan Metode RSA Pada Smartphone Berbasis Android. Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi), 2(2), 127–134.
[2] Piarsa, I. N. (2012). Steganografi Pada Citra Jpeg Dengan Metode Sequential Dan Spreading. Lontar Komputer, 2(1), 52–63.
[3] Sibarani, E. B. H., Zarlis, M., & Sembiring, R. W. (2017). Analisis Kripto Sistem Algoritma Aes Dan Elliptic Curve Cryptography (Ecc) Untuk Keamanan Data. InfoTekJar (Jurnal Nasional Informatika Dan Teknologi Jaringan), 1(2), 106–112. https://doi.org/10.30743/infotekjar.v1i2.71.
[4] Damanik, P. S. E. A. (2019). Implementasi Algoritma Elliptic Curve Cryptography ( ECC ) Untuk Penyandian Pesan Pada Aplikasi Chatting Client Server Berbasis Desktop. Jurnal Riset Komputer (JURIKOM), 6(4), 395– 400.
[5] Febrianto, A., & Apriani, J. (2017). “PERBANDINGAN SISTEM PENGAMANAN EMAIL MENGGUNAKAN TEKNIK PUBLIC KEY ENCRYPTION DAN PRETTY GOOD PRIVACY ( PGP )” ( Studi Kasus?: AMIK Dian Cipta Cendikia Bandar Lampung ). Jurnal Cendikia, 13(2), 17–25.
[6] Ivan Kurniawan Prasetyo. (2012). My study in Information Technology: Fungsi Hash MD5 dan SHA-1. 11 Juli 2012 http://studyinformatics.blogspot.com/2012/07/fungsi-hashmd5-dan-sha-1.html
[7] jaya santoso sirait, Rumani, & Paryasto, M. W. (2017). Implementasi Kriptosystem menggunakan metode Algoritma ECC dengan Fungsi Hash SHA-256 pada sistem ticketing online Implementation of Crypthosystem using Method Algorithm ECC with Function of Hash SHA- 256 in online ticketing system. E-Proceeding of Engineering, 4(3), 4138–4146.
[8] Kurniawan, D. (2018). Perencanaan Aplikasi Pengamanan Data Text Menggunakan Blowfish dan RC6. Pelita Informatika Budi Darma, 17, 254–260.
[9] Laila, N., & Sinaga, A. S. R. (2019). Implementasi Steganografi LSB Dengan Enkripsi Vigenere Cipher Pada Citra. ScientiCO?: Computer Science and Informatics Journal, 1(2), 47. https://doi.org/10.22487/j26204118.2018.v1.i2.11221
[10] Meko, D. A. (2018). Jurnal Teknologi Terpadu Perbandingan Algoritma DES , AES , IDEA Dan Blowfish dalam Enkripsi dan Dekripsi Data Donzilio Antonio Meko Program Studi Teknik Informatika , STIMIK Kupang Jurnal Teknologi Terpadu. Jurnal Teknologi Terpadu, 4(1), 8–15.
[11] Pramana Hostiadi, D., & Suradarma, I. B. (2017). Implementasi Pengamanan PGP Pada Platform Zimbra Mail Server. Lontar Komputer?: Jurnal Ilmiah Teknologi Informasi, 8(1), 41. https://doi.org/10.24843/lkjiti.2017.v08.i01.p05
[12] Shruti Sekra, Samta Balpande, Karishma Mulani, "Steganography Using Genetic Encryption Along With Visual Cryptography" SSRG International Journal of Computer Science and Engineering 2.1 (2015): 1-5.
Keywords
Pretty Good Privacy, SHA1, Elliptic Curve Cryptosystem, Blow Fish Cryptosystem, Base64, encryption, decryption, data security.