Analisis Pola Identifikasi Zero Knowledge Proof Dengan Algoritma Feige Fiat Shamir Menggunakan Blum Blum Shub
DOI:
https://doi.org/10.54367/means.v6i1.1203Keywords:
Zero Knowledge Proof, Feige Fiat Shamir, CPRNG, Blum Blum Shub, CryptographyAbstract
Protocol Zero Knowledge Proof is one of the protocols in Cryptography that has a fairly good level of security, because it applies the concept of "Truly Zero Knowledge Proof" which is not leaking any information. This protocol is used in the Fiat Shamir, Guillou Quisquater and Schnorr Feige Algorithms, all of which are Cryptographic Algorithms using private keys and public keys. In the Public key, all three of these Algorithms use a random number generator at the values p and q to get the public key. In this study, the author will generate a public key generation test using CPRNG (Cryptographically-secure Pseudo-Random Number Generator) with the Blum Blum Shub algorithm. The test will be conducted on the Fiat Feige Algorithm, the formation of the key will use the Blum Blum Shub Algorithm, but the Identification Protocol still uses the Fiat Shamir Feige Algorithm. The results of this study show the Feige Fiat Algorithm with the Blum Blum Shub Algorithm as the key builder successfully identifies the pattern sent by the signer.References
W. Sudiarto Raharjo, I. D. E.K. Ratri, and H. Susilo, “Implementasi Two Factor Authentication Dan Protokol Zero Knowledge Proof Pada Sistem Login,†J. Tek. Inform. dan Sist. Inf., vol. 3, no. 1, pp. 127–136, 2017, doi: 10.28932/jutisi.v3i1.579.
Y. Anshori, A. Y. Erwin Dodu, and D. M. P. Wedananta, “Implementasi Algoritma Kriptografi Rivest Shamir Adleman (RSA) pada Tanda Tangan Digital,†Techno.Com, vol. 18, no. 2, pp. 110–121, 2019, doi: 10.33633/tc.v18i2.2166.
W. S. Raharjo and D. Sutanti, “Implementasi Zero Knowledge Proof Menggunakan Protokol Feige Fiat Shamir Untuk Verifikasi Tiket Rahasia,†J. Ultim., vol. 7, no. 2, pp. 91–97, 2016, doi: 10.31937/ti.v7i2.355.
R. Toyib and Y. Darnita, “Pengamanan Data Teks Dengan Menggunakan Algoritma Zero-Knowledge Proof,†no. 1, pp. 16–23, 2020.
L. J. Pangaribuan, “Kriptografi Hybrida Agloritma Hill Cipher Dan Rivest Shamir Adleman (RSA) Sebagai Pengembangan Kriptografi Kunci Simetris (Studi Kasus : Nilai Mahasiswa Amik Mbp),†J. Teknol. Inf. DAN Komun., vol. 7, no. 1, pp. 11–26, 2018.
M. B. Sanjaya and P. A. Telnoni, “Implementasi Random Number Blum-Blum-Shub Dan Chaotic Function Untuk Modifikasi Key Generating Pada Kriptografi Aes Implementasi Blum-Blum-Shub Dan Chaotic Function Untuk Modifikasi Key Generating Pada Aes Implementation of Blum-Blum-Shub and Chaotic Func,†J. Elektro Telekomun. Terap. Desember, vol. 1, no. 1, pp. 154–165, 2015.
L. Maulana, A. Kusyanti, and F. A. Bakhtiar, “Implementasi Metode Autentikasi dengan Zero Knowledge Proofmenggunakan Protokol Feige-Fiat-Shamir Identification Schemepada PerangkatInternet of Things,†vol. 3, no. 9, pp. 8937–8945, 2019, [Online]. Available: http://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/6311/3034.
C. Harahap, G. Ginting, and T. Zebua, “Perancangan Aplikasi Pengacakan Pemenang Undian Berhadiah Menggunakan Metode Blum-Blum Shub Berbasis Android,†JURIKOM (Jurnal Ris. Komputer), vol. 7, no. 2, p. 301, 2020, doi: 10.30865/jurikom.v7i2.2112.
L. J. Pangaribuan, “Implementasi Kriptografi Menggunakan Metode Hill Chiper,†in Seminar Nasional Inovasi dan Teknologi Informasi (SNITI), vol. 2014, pp. 1–9.
L. J. Pangaribuan, “KRIPTOGRAFI MODERN KUNCI ASIMETRIS DENGAN METODE RSA UNTUK KEAMANAN PESAN DALAM E-MAIL,†in Konferensi Nasional Pengembangan Teknologi Informasi dan Komunikasi (KETIK), 2014, pp. 153–159.
A. Ramadhan and S. Teknik, “Perbandingan Algoritma Linear Congruential Generators , BlumBlumShub , dan MersenneTwister untuk Membangkitkan Bilangan Acak Semu.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 MEANS (Media Informasi Analisa dan Sistem)
This work is licensed under a Creative Commons Attribution 4.0 International License.