PLAYFAIR CIPHER BLOCK CHAINING AND ELLIPTIC CURVE FOR REPRESENTATIONAL STATE TRANSFER DATA EXCHANGE SECURITY



Usman Zamari(1*)

(1) Universitas Gadjah Mada
(*) Corresponding Author

Abstract


REpresentational State Transfer (REST) is a representation for online data exchange and have good speed and response. The ease for commnunication exchange if not safeguard can be result in unauthorized information is read by unauthorized persons.

Cryptography is an art and science used to keep or secure data. Modifying the cryptography algorithm in another form from the basic method, will get a variety of it method. Playfair Cipher Block Chaining (Playfair CBC) algorithm is used to secure request data by applying encrypted digraph to build lock again. The weakness of this algorithm lies in securing the key so that another algorithm is needed to do so. The Elliptic Curve algorithm is used to solve the security lock problem.

Testing had done by using 10 different data. Testing indicates that the key can be used to perform encryption and decryption. Perform brute force analysis on the algorithm used. Analysis is shows the algorithm used has a good level of security.

Full Text:

PDF


References

Kopack, M. dan Potts, S., 2003, Sams Teach Yourself Web Services in 24 Hours, Indianapolis, Indiana, USA. Al-Zoubi, K. dan Wainer, G., 2009, Using REST Web-Services Architecture for Distributed Simulation, IEEE, (114-121), https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5158326. Stallings, W., 2003, Cryptography and Network Security Principles and Practice Third Edition, Pearson Education, New Jersey, USA. Rahardjo, B., 2002, Kemanan Sistem Informasi Berbasis Internet, PT Insan Komunikasi , Bandung, Indonesia. Schneier, B., 1996, Applied Kriptografi, Scond Edition : Protocols, Algoritms, and Source Code in C. John Wiley & Sons. Goyal, P., Sharma , G. dan Kushwah, S. S., 2015, A New Modified Playfair Algorithm using CBC, IEEE, Dept.of Computer Science & Engineering ITM Group of Institutions, Gwalior (India), https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7546249. Munir, R., 2006, Kriptografi, Informatika Bandung, Bandung. Stallings, W., 2014, Cryptography and Network Security Principles and Practice Sixth Edition, Pearson Education, Edinburg Gate Harlow Essex CM20 2JE, England. Stinson, D. R., 2006, Cryptography Theory And Practice Third Edition, Chapman & Hall/CRC Taylor & Franscis Group, Canada. Webber, J., Parastatidis, S. dan Robinson, I., 2010, REST in Practice, O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, United States of America.




Article Metrics

Abstract views : 2537 | views : 1360

Refbacks

  • There are currently no refbacks.




ISSN 0215-9309 (Print)

Jumlah kunjungan : Web
Analytics View my Stat.