Implementasi Algoritma Merkle-Hellman Knapsack dalam Penyandian Record Database
DOI:
https://doi.org/10.54367/means.v5i2.983Keywords:
cryptography, public key cryptography, merkle-hellman knapsack algorithmAbstract
A lot of data is misused without the data owner being aware of it. Software developers must ensure the security user data on their system. Due to the size of the market that houses data, the security of record databases must be of great concern. Cryptographic systems or data encryption can be used for data security. The Merkle-Hellman Knapsack algorithm is included in public-key cryptography because it uses different keys for the encryption and decryption processes. This algorithm belongs to the NP-complete algorithm which cannot be solved in polynomial order time. This algorithm has stages of key generation, encryption, and decryption. The results of this study secure database records from theft by storing records in the form of ciphertext/password. Ciphertext generated by algorithmic encryption has a larger size than plaintext.References
Ghosh, Arpita, and Aaron Roth. "Selling privacy at auction." Proceedings of the 12th ACM conference on Electronic commerce. 2011.
Fleischer, Lisa K., and Yu-Han Lyu. "Approximately optimal auctions for selling privacy when costs are correlated with data." Proceedings of the 13th ACM Conference on Electronic Commerce. 2012.
Rahmadani, R., & Hutahaean, H. D. (2020). Implementation Of Pohlig-Hellman Algorithm And Steganography Combination Of First Of File (Fof) And End Of File (EOF) For File Security. Jurnal Mantik, 4(1, May), 14-19.
Budiman, M. A., & Rachmawati, D., Implementation of Super-Encryption with Trithemius Algorithm and Double Transposition Cipher in Securing PDF Files on Android Platform. Journal of Physics: Conference Series, vol. 978, pp. 012088. 2018.
Purba, Wina Mariana Br. "Implementasi Algoritma Knapsack Dan Base64 Pada Pengamanan File Teks." Pelita Informatika: Informasi dan Informatika 7.4 (2019): 291-302.
Asriyanik, Asriyanik. "Studi Terhadap Advanced Encryption Standard (Aes) Dan Algoritma Knapsack Dalam Pengamanan Data." SANTIKA (Jurnal Ilmiah Sains dan teknologi) 7.1 (2017): 553-561.
Kester, Quist-Aphetsi. "A Hybrid Cryptosystem based on Vigenere cipher and Columnar Transposition cipher." arXiv preprint arXiv:1307.7786 (2013).
Preetha, M., and M. Nithya. "A study and performance analysis of RSA algorithm." International Journal of Computer Science and Mobile Computing 2.6 (2013): 126-139.
Torkaman, Mohammad Reza Najaf, Nazanin Sadat Kazazi, and Azizallah Rouddini. "Innovative approach to improve hybrid cryptography by using DNA steganography." International Journal on New Computer Architectures and Their Applications 202 (2012): 225-236.
Rahmadani, R., Putri, T. T. A., Sriadhi, S., Sari, R. D., & Hutahaean, H. D. Data security system using hybrid cryptosystem RC4A-RSA algorithm. IOP Conference Series: Materials Science and Engineering, vol. 830, pp. 032008. 2020.
Hwang, M. S., Lee, C. C., & Tzeng, S. F. (2009). A new knapsack public-key cryptosystem based on permutation combination algorithm. Information Journal of Applied Mathematics and Computer Sciences, 5(1), 33-38.
Pattiasina, Timothy John. "Rancang Bangun Aplikasi Enkripsi dan Dekripsi Email Dengan Menggunakan Algoritma Advanced Encryption Standard Dan Knapsack." Teknika 3.1 (2014): 1-10.
Aminudin, Aminudin, Ahmad Faisal Helm, and Sofyan Arifianto. "Analisa Kombinasi Algoritma Merkle-Hellman Knapsack Dan Logaritma Diskrit Pada Aplikasi Chat." Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK) 5.3 (2018): 325-334.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 MEANS (Media Informasi Analisa dan Sistem)
This work is licensed under a Creative Commons Attribution 4.0 International License.