A NOVELTY METHODS OF ALGORITHMS INTO LAYERED AND DECRYPTION

Antoni Faculty Of Engineering, Universitas Islam Sumatera Utara [email protected] Solly Aryza Faculty Of Science & Technology, Universitas Panca Budi [email protected] Bonar Harahap Faculty Of Engineering, Universitas Islam Sumatera Utara [email protected] Mahrani Arfah Faculty Of Engineering, Universitas Islam Sumatera Utara [email protected] Azmi Rizki Lubis Faculty Of Engineering, Universitas Islam Sumatera Utara [email protected]

ABSTRACT

Encryption is one method used to protect or maintain the data. Data that has encrypted will be kept confidential where the contents of the data are altered, so it does not correspond to the actual data. To be able to read data that has been encrypted earlier required a process called decryption. In the science of cryptography, the data will be safeguarded consists of three main components, that is the message that will be read (plaintext), the keys to perform cryptographic techniques (), and a random signal that is unreadable (). Testing is done by sending the data in the form of words or sentences by using a secret key. Results of analysis of data from tests performed show that with the incorporation of some algorithm plated confidentiality of information can be safer because it takes several different stages to solve.

KeywordS : Algorithm,Cryptography,Decryption, Encryption

1. Overview Cryptography is a science which studies how to keep data or messages remain By rapid growth of communication world, secure when transmitted from the transmitter especially in the field of information such as to the receiver without interference from third data, images, audio or video, we need a parties. According to Bruce Scheiner in his system that can maintain the confidentiality book "Applied Cryptography," cryptography is of such information. Security is a standard the science and art of keeping distributing requirement and becomes essential, the messages to stay safe or secure. secrecy of data requires a security Besides these terms, there is also another mechanism that can deal with the meaning that cryptography is the study of confidentiality of such information ( Solly mathematical techniques that relate to Aryza et al., 2018). aspects of information security such as data Encryption is the process of scrambling confidentiality, data validity, data integrity, method or means of securing the information and authentication of data. (Ikhwan & Rahim, to make such information can not be read 2016) The beginning of cryptography is without any specialized knowledge. understood as the science of hiding Encryption can be used for security purposes, but other techniques are still messages (Aspan & Aryza, 2018), but over needed to make communications secure, the times until today, the notion of mainly to ensure the integrity and cryptography evolved into a science of authentication of a message. This study was mathematical techniques used to solve conducted to analyze a method of security issues such as privacy and encryption-decryption so that it becomes a authentication (Indar Sugiarto, Thiang multi-layered password that aims to improve Thiang, & Timothy Joy Siswanto, 2008). the security of information (Aryza et al., There is four fundamental purpose of the 2018) . science of cryptography is that also the security aspect of information, namely: 2. Cryptography • Confidentiality is a service which is used to keep the contents of the data of anyone 3. Introduction to Cryptography Type but who has the authority or the secret key to 3.1 Types of Cryptography According to its unlock the information that has been Development encoded. Cryptographic algorithms can be classified into two types based on its development, namely the classical • Data integrity is associated with cryptography and modern cryptography. preservation of unauthorized data changes. To maintain data integrity system should  Classical Cryptographic Algorithm have the ability to detect data manipulation This algorithm is used since before the era of by those who are not entitled to insertion, computerization and mostly uses a symmetric key deletion, and other data entry into the actual technique. The method to hide the message is to use data. the technique of substitution or transposition or both [4]. Substitution technique is to replace the • Authentication is associated with the characters in plaintext into other characters that the identification or recognition, either as a whole result is ciphertext. While transposition is the of systems or the information itself. Two technique of changing plaintext into ciphertext by parties communicating must be introduced means of permutations of character. It is a complex themselves. Information sent through the combination of both is underlying the formation of a canal must be authenticated authenticity of wide range of modern cryptographic the contents of the data, delivery time, and algorithms(Hesari & Sistani, 2017). others.  Modern Cryptographic Algorithms • Non-repudiation or non-denial is an This algorithm has a more complex difficulty level attempt to prevent the denial of the delivery [2], and the strength is in key [5]. This algorithm or the creation of information by the parties uses a binary symbol because it follows the digital that send or make such information. computer processing operations. Thus requiring a basic form of knowledge of mathematics to master it [4]. 2.1 Main process in Cryptography 3.2 Types of Cryptography According to The Key  Encryption is the process by which Cryptographic algorithms can be classified into two information or data before it is transmitted, it types based on the key, the symmetric algorithms is converted into a form that can hardly be and asymmetric algorithms [2]. recognizable as information initially using a specific algorithm. 3.2.1 Symmetric Algorithms  A description is the opposite of encryption These algorithms are called symmetric because it that reshapes disguised as the initial has the same key in the encryption and decryption information.. process so this algorithm also often called single-key algorithm or one-key algorithms. Key in this algorithm is confidential or private so that the algorithm is also called the secret key algorithm [2].

Picture 2.Symmetric Algorithms Illustration Picture 1.Basic Cryptography Illustration  Excess Symmetric Algorithms 2.2 The Term in Cryptography Here are the terms used in cryptography: Speed of operation is higher when compared to the asymmetric algorithm, because the speed is high  Plaintext (M) is a message to be sent enough, it can be used in real-time systems. (containing the original data).  Ciphertext (C) is an encrypted message  Symmetric Algorithms Weakness (encrypted) which is the result of the encryption. For each delivery of messages with different user  Encryption (Function E) is the process of needs different keys as well, so there will be converting plaintext into ciphertext. difficulties in the key management, commonly called  Decryption (Function D) is the process of key distribution problem. conversion of ciphertext into plaintext, so that it becomes the initial data or original data. 3.2.2 Asymmetric Algorithms  Key is a secret number, which is used in the This algorithm is called asymmetric because the key encryption and Decryption process. used for encryption is different from the key used for decryption. The key used for encryption is public key so that the algorithm is also called a public key algorithm. Whereas the key for decryption using a secret key or private key [2].

Picture 3.Asymmetric Algorithm Illustration Pictur Asymmetric Algorithm advantages: e.5 Alphabetical Order Index  Security issues at key distribution can be better.  Key management problems better because fewer Alphabet used to build the message (plaintext) was number of keys. given an index number as shown above. The characters are used as keys were also taken from the Weakness Asymmetric Algorithm: alphabet. The key will be "added" or create a "shift"  The speed is lower when compared to a character of the original message to establish a symmetric algorithm. password. If when added or shifted generate an  For the same level of security, the key used is index of more than 25, the order of the index will longer than the symmetric algorithm. return to 0, From Z back to A. 4. Testing Methods 4.1.2 Cipher At the beginning the data security with cryptography Another classic example is the Atbash Cipher. This that uses the classic cryptographic algorithms are still Atbash Cipher permute letters from front to back so character-based, using a pen and paper only, no back to front as shown below: computer. Classical cryptographic algorithm belongs to the symmetric key cryptography. Classic cryptographic algorithms : Pesan: ABCDEFGHIJKLMNOPQRSTUVWXYZ  Substitution Sandi: ZYXWVUTSRQPONMLKJIHGFEDCBA  Transposition Ciphers In this study the author will only discuss about Substitution Ciphers. By using a password Atbash, ZENIUS message will 4.1 Substitution Ciphers be AVMRFH password. The recipient only needs to change one letter or character in swap the order of the letter behind it. Atbash name is the message (plaintext), according to the rules of the derived from its first use in Hebrew letters, the Aleph- key (key), it becomes another character in the secret Tav-Shin-Beth, the first, last, second and penultimate password (ciphertext). Here is part of the Substitution in Hebrew. If the name in roman letters or less will be Chipers : Azby [7].

4.1.1 4.1.3 Polyalpabetic Cipher The simplest example of a substitution cipher is a Vigenere Cipher is included in polyalpabetic Caesar cipher. Caesar Cipher is a substitution cipher substitusion cipher. The new algorithm is widely that uses a key length of 1 characters (characters known that 200 years later by the inventor cipher is drawn from the alphabet). Usually, the parties have then called Vigenere Cipher. agreed and both know that they will use Caesar Vigenere Vigenere Cipher used to encrypt the Cipher with certain characters to exchange secret Square, each row in the square states ciphertext messages. letters obtained by Caesar Cipher. The sender of the message: has the original Examples of application of Vigenere Cipher message, know the key, know how to use Caesar Cipher. He use Caesar Cipher to generate the secret Plaintext : THIS PLAINTEXT password. Key :sonysonysonys Recipients of the message: know the key, know how Ciphertext: LVVQ HZNGFHRVL to use Caesar Cipher, know the secret password. He uses the password to decode the secret in order to If the key length is shorter than the length of the obtain the original message. plaintext, then the key is repeated periodically. In this case the key "sony" repeated as long as its plaintext. Basically each letter is Caesar cipher encryption with different keys. c(‘T’) = (‘T’ + ‘s’) mod 26 = L T = 20 dan s= 19  (20+19)%26=13  L c(‘H’) = (‘H’ + ‘o’) mod 26 = V, ect

5. Analysis of Test Results In this case I try to incorporate some of the Step 1: cipher text is decrypted by subtracted with passwords in order to establish a password also key (SUN), so that the results will show the plaint called a streak password, for example, after do the text. Atbash Cipher than encrypted it again by the Tables 3. Polyalphabetic Cipher Decryption Results Polyalphabetic Cipher.

5.1 Encryption Process Data submitted following the results of tests performed: HAFIZHATUL AHLA This message consists of 14 characters.

Step 1: Using Atbash Cipher, it will be obtained Plain Text : HAFIZHATUL AHLA Cipher Text : SZURASZGFO ZSOZ Step 2: Use the plain text in step 1 as cipher text Caesar Cipher and than decrypt it with key E = 5. Step 2 : Using Caesar Cipher, where the cipher text Resulting Decryption as follows: in step 1 will be plain text in step 2. Chiper text in Tables 4. Caesar Cipher Decryption Results step 2 is obtained by using key E.

Table1. Key Of E and Chiper Text

Picture 5. Caesar Cipher Testing Results

The purpose of the key, E = 5 is the numerical value Step 3 is the final stage of the decryption process, by of each letter in the plain text character summed with using plain text in Caesar Cipher as a cipher text and 5. If when added or shifted generate an index of more using Atbash Cipher will be obtained: than 25, the order index should return to 0. Chiper Text : SZURASZGFO ZSOZ Plain Text : HAFIZHATUL AHLA Step 3: is the last step of the process is to use Polyalphabetic Cipher, where the cipher text in step 2 will be plain text, cipher text obtained by using key 6. Conclusion SUN. The conclusions that can be drawn from this study Tables 2. Chiper Text Using Key Sun are : 1. Whereas by merging multiple layered confidentiality algorithm information may be safer because it takes several different stages to solve.

2. Classical cryptography algorithm focuses on the power of secrecy. With intent algorithms used (which means if the algorithms used are known Picture 6. Polyalphabetic Cipher Testing Results then the message is clear "leaky" and can know its contents by anyone who knows the The way to obtain the cipher text in the last step is algorithm). the same as Caesar Cipher, by summing the index number. Key used (SUN) consists of three 3. Cryptography is a science which studies how to characters, while the message (XezwfxeLkt exte) keep data or messages remain secure when consists of 14 characters, we can redo the key so transmitted from the sender to the receiver that the key character length = length of character without interference from third parties. messages. This applies to all cases, in which the length of the key characters are not the same as the 4. Encryption is the process by which information character length messages. or data to be transmitted, is converted into a form that can hardly be recognizable as 5.2 Decryption Process information initially using a specific algorithm. Decryption is done by reversing the encryption process with the following stages: 5. Decryption is the process of restoring the http://puslit2.petra.ac.id/ejournal/index.php/elk/a original data so that it can be read or rticle/view/17353 understood back.

7. References

[1] Diffie, Whitfield, Martin E Hellman. 1976. New Directions in Cryptography. IEEE Trans. Info. Theory IT-22.

[2] Prayudi, Yudi, Idham Halik. 2005. Studi Analisis Algoritma Rivest 6 (RC6) Dalam Enkripsi/Dekripsi Data. Seminar Nasional Aplikasi Teknologi Informasi 2005 (SNATI 2005), Yogyakarta.

[3] Rizal, Ansar, Suharto. 2011. Implementasi Algoritma RC4 untuk Keamanan Login Pada Sistem Pembayaran Uang Sekolah. Dielektrika, ISSN 2086-9487 Vol. 2 No.2.

[4] Sadikin, Rifki. 2012. Kriptografi untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java. Penerbit Andi, Yogyakarta.

[5] Wirdasari, Dian. 2008. Prinsip Kerja Kriptografi dalam Mengamankan Informasi, Jurnal SAINTIKOM Vol.5 No.2.

[6] https://shineofscience.wordpress.com/tag/konsep- kriptografi/

[7] https://www.zenius.net/blog/7095/kriptografi- enkripsi-dekripsi [8] Aryza, S., Irwanto, M., Lubis, Z., Siahaan, A. P. U., Rahim, R., & Furqan, M. (2018). A Novelty Design Of Minimization Of Electrical Losses In A Vector Controlled Induction Machine Drive. IOP Conference Series: Materials Science and Engineering, 300(1), 12067. Retrieved from http://stacks.iop.org/1757-899X/300/i=1/a=0120 67 [9] Aspan, H., & Aryza, S. (2018). Dear Sir/Madam, Elpina, Henry Aspan, Solly Aryza This is to inform you that after a rigorous review process, our review panel has reached a decision about your paper! “, (January), 76318. [10] Hesari, S., & Sistani, M. B. N. (2017). Efficiency improvement of induction motor using fuzzy- genetic algorithm. 30th Power System Conference, PSC 2015, (May 2016), 210–216. https://doi.org/10.1109/IPSC.2015.7827750 [11] Ikhwan, A., & Rahim, R. (2016). Implementation of Modified Median Filtering Algorithm for Salt & Pepper Noise Reduction on Image. The International Journal Of Science & Technoledge, 4(11), 2321–2919. Retrieved from www.theijst.com [12] Indar Sugiarto, Thiang Thiang, & Timothy Joy Siswanto. (2008). Disain dan Implementasi Modul Akuisisi Data sebagai Alternatif Modul DAQ LabVIEW. Jurnal Teknik Elektro, 8(1), 30– 37. Retrieved from