IMPLEMENTASI KRIPTOSISTEM KURVA ELIPTIK PADA DATA AUDIO DIGITAL
Abstract
Technology not only allows information submitted in the form of text, but also in the form of images, audio or video. However, the use of digital audio data is not necessarily improves the security of the message. Various attack techniques emerged so others can know the confidential information contained in digital audio messages. One attempt to provide information that can be done is a cryptographic system or cryptosystem. In the elliptic curve equation are the values that can be used as a private key and public key to encrypt the data in this form of audio. Audio data will be processed on the secure encryption and decryption using elliptic curve cryptography. Parameters and variables contained in the curve equation would be calculated to determine the shared secret key to be used in both encryption and decryption process audio. The conditions before the encrypted audio data are audible. The result of encrypting the audio data to produce a new audio is not clear. Decryption process causes the data back to the original audio data so that the second audio data can be heard clearly. Attack man in the middle of this process can’t decrypt the encrypted audio file. File decryption results may not be tuned so that the audio file will be secure and can only be heard by the user encryption and decryption that really has the right combination of keys that user actual encryption and decryption.
References
Lu,G.,1999, Multimedia Database Management System, Artech House, Boston, London.
Muller, V., dan Paulus, S., 1998, Elliptische Kurven Und Public Key Kryptographie, Technische Universitat Darmstadt, Fachbereich Informatik, Darmstadt.
Shen, G., Zheng, X., 2008, Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce, IEEE International Symposium on Electronic Commerce and Security, University of Science and Technology, Beijing, China.
Sandoval, MM., dan Uribe, CF., 2007, A Hardware Architecture for Elliptic Curve Cryptography and Lossless Data Compression, Proceedings of the 15th International Conference on Electronics, Communications and Computers (CONIELECOMP 2005), National Institute for Astrophysics, Optics and Electronics Computer Science Department, Mexico.
Schneier, B., 1996, Applied Cryptography Protocols, Algorithm and Source code in C, 2nd Edition, Willey Computer Publishing, John Willey & Sons, inc.
Shoup,V., 2008, A Computational Introduction to Number Theory and Algebra, Version 2, Cambridge University Press.
Stalling, W., 1999, Cryptography and Network Security, Principal and Practice, 2nd Edition, Prentice Hall, New Jersey.
Sung, KS., Ko, H., dan Seok Oh, H., 2007., XML Document Encrypt Implementation using Elliptic Curve Cryptosystem, IEEE International Conference on Convergence Information Technology, School of Engineering, Dept of Computer Science, Kyungwon University.
Wahid, A., 2003, Impelementasi Audio Security Menggunakan Algoritma Data Encryption Standart (DES), Tesis S2 Ilmu Komputer Universitas Gadjah Mada, Yogyakarta.
Zhang, Y., Cui, T., dan Tang, H., 2008, A New Secure E-mail Scheme Based On Elliptic Curve Cryptography Combined Public Key, IFIP International Conference on Network and Parallel Computing, College of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China.