ANALISIS KINERJA ALGORITMA HONEY ENCRYPTION DAN ALGORITMA BLOWFISH PADA PROSES ENKRIPSI DAN DEKRIPSI
DOI:
https://doi.org/10.29103/techsi.v10i2.858Abstract
Algoritma Honey Encryption dan algoritma Blowfish merupakan dua buah algoritma kriptografi yang dapat digunakan dalam proses enkripsi dan dekripsi. Honey Encryption merupakan salah satu algoritma yang masih baru dalam ilmu kriptografi, untuk itu perlu dilakukan analisis kinerja algoritma tersebut pada proses enkripsi dan dekripsi. Berdasarkan studi perbandingan yang telah dilakukan diperoleh hasil bahwa jika ditinjau proses enkripsi dan dekripsinya, algoritma Honey Encryption jauh lebih efektif dan efisien dibandingkan dengan algoritma Blowfish dari segi keamanan dan tingkat kompleksitas enkripsi dan dekripsinya.
References
Nahri Syeda Noorunnisa, and Dr. Khan Rahat Afreen, Review on Honey Encryption Technique, IJSR, Volume 5 Issue 2, February 2016, 1683-1686.
Rifkie Primartha, Penerapan Enkripsi dan Dekripsi File Menggunakan Algoritma Data Encryption Standard (DES) JSI, Volume 3, No. 2, Oktober 2011, 371-387.
Santhi Baskaran, S.V.L Sarat Chandra, P.Venkatesh, E.Silambarasan, and M. Dinesh, Implementation of Enhanced Honey Encryption for IoT Security, IJNTR, Volume-3, Issue-3, March 2017, 87-89.
Taufiqur, Rahman Muhammad., Aryo Pinandito, dan Eko Sakti Pramukantoro, Perbandingan Performansi Algoritme Kriptografi Advanced Encryption Standard (AES) dan Blowfish pada Text di Platform Android Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, Volume 1, No 12, Desember 2017, 1551-1559.
Downloads
Published
Issue
Section
License
Authors retain copyright and grant the journal right of first publication and this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 that allows others to share the work with an acknowledgement of the works authorship and initial publication in this journal.
All articles in this journal may be disseminated by listing valid sources and the title of the article should not be omitted. The content of the article is liable to the author.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
In the dissemination of articles by the author must declare the TECHSI Journal as the first party to publish the article.