Pengamanan File Teks Dengan Algoritma Enkripsi Pohlig-Hellman Dan Steganografi Ezstego Pada File Audio
Abstract
In cryptography, the encryption process is carried out by changing the data into another form of data that cannot be understood and its meaning can be understood. However, with other forms of data, this can raise suspicion, so after the data is encrypted, it is necessary to hide the data into an object without changing the object's shape using steganography techniques. The process of double securing text files is done by using cryptographic techniques using the Pohlig-Hellman algorithm, then the encryption results in the form of ciphertext are inserted back into the audio object using the Ezstego algorithm. From the analysis, the ciphertext characters that have been encrypted using the Pohlig-Hellman algorithm can be accurately inserted into the audio object without changing the audio form using the Ezstego algorithm.
References
. R.Munir, "Analisa Keamanan Enkripsi Citra Digital Menggunakan Kombinasi
. Dua Chaos Map dan Penerapan Teknik Selektif", Juti, vol. 10, pp89-95, 2012
. R.N. Sari, , "Penggunaan Algoritma Kriptografi Pohlig-Hellman Dalam
. Mengamankan Data", Seminar Nasional Informatika, pp.240-245, 2015
. A. Simarmata, "Rancangan Model Algoritma Pohlig-Hellman dengan Menggunakan Multiple-key Berdasarkan Algoritma RSA Multiple-key", Seminar Nasional Aplikasi Teknologi informasi", pp.21-27, 2013
. R.Munir, "Eksperimen Steganalisis dengan Metode Visual Attack pada Citra Hasil EzStego Berformat GIF", SNATI, pp.8-14, 2016
. Wira (2017,Sep.27). Pengamanan dan Keamanan [online]. Available : https://wiratamabakti.com/2017/09/27/pengamanan-dan-keamanan/
. E.R. Agustina and A. Kurniati, "Pemanfaatan Kriptografi Dalam Mewujudkan Keamanan Informasi Pada e-Voting di Indonesia", Seminar Nasional Informatika, pp.22-28, 2009
. Sumberpengertian (2019,Feb.18). Pengertian Teks Menurut Para Ahli [online] Available : http://www.sumberpengertian.co/pengertian-teks-menurut-para-ahli
. S.Rohayah et al, "Aplikasi Steganografi Untuk Penyisipan Pesan", Jurnal Informatika, vol. 9, pp.976-981, 2015
. Sora, (2019,Feb.18). Pengertian Audio dan Media Audio Secara Lengkap [online]. Available: http://www.pengertianku.net/2014/11/pengertian-audio-dan-media-audio-secara-lengkap.html
. A.Simarmata, "Rancangan Model Algoritma Pohlig-Hellman dengan Mengguakan Multiple-key Berdasarkan Algoritma RSA Multiple-key", Sminar Nasional Aplikasi Teknologi Informasi, pp.21-27, 2013
Copyright (c) 2025 Herwansyah Herwansyah

This work is licensed under a Creative Commons Attribution 4.0 International License.



