Securing Audio Chat With Cryptool-Based Twofish Algorithm
Main Article Content
Abstract
Technology and the internet are growing very rapidly in society making it easy for people to share information and communicate with each other. However, the security of such data or information is something that should be highlighted. The utilization of technology and the internet has many security gaps that can make data or information vulnerable to being stolen and even misused. Valuable data or information is very likely to be accessed by unauthorized people. On the other hand, data and information are prone to be illegally altered and even duplicated. In connection with various possible data or information security issues, it is necessary to do a data security. The purpose of this study is to secure audio chat using a Cryptool-based Twofish algorithm. Based on research conducted, the security process with encryption and decryption simulations was successfully carried out on audio chat. Audio chat sent via IP Address can be encrypted into ciphertext and can be decrypted back into audio at a speed of 15.78 kB/s and the resulting size is also still the same, which is 160 packets. This Twofish algorithm proved to be well usable because the size and quality of chat audio generated from decryption is still the same as audio chat before it is encrypted.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
J. H. P. Tambunan, H. A., & Sitorus, “Enkripsi dan dekripsi dalam proses pengiriman data dengan menggunakan algoritma twofish,” J. Bisantara Inform., vol. 1, no. 1, pp. 17–17, 2017.
W. J. Shin, “Comparative analysis of aes, blowfish, twofish, and threefish encryption algorithms,” J. Anal. Appl. Math., vol. 10, 2017.
M. C. B. Umanailo et al., “Cybercrime case as impact development of communication technology that troubling society,” Int. J. Sci. Technol. Res., vol. 8, no. 9, pp. 1224–1228, 2019.
D. J. Neufeld, “Understanding cybercrime,” Proc. Annu. Hawaii Int. Conf. Syst. Sci., pp. 1–10, 2010, doi: 10.1109/HICSS.2010.417.
M. A. Twofish, “Aplikasi enkripsi dan dekripsi file menggunakan algoritma twofish,” pp. 13–25.
T. Poduval, A., Rai, N., Khan, P., Sane, A., Chaudhari, “A survey on different encryption techniques for image, Video, Audio And Docs,” Int. J. Eng. Appl. Sci. Technol., vol. 5, no. 11, pp. 284–288, 2021.
N. Charibaldi and B. Yuwono, “Aplikasi enkripsi pengiriman file suara,” vol. 2011, no. semnasIF, pp. 201–207, 2011.
S. Sularno, D. P. Mulya, and R. Astri, “Determination of the shortest route based on bfs algorithm for purpose to disaster evacuation shelter,” Sci. J. Informatics, vol. 8, no. 1, pp. 33–42, 2021.
A. A. G. B. P. Ida Ayu Widyantari Arnawa, Putu Eka Widastra Hary C., “Perbandingan waktu enkripsi antara metode electronic codebook (ECB) dan chipher blick chaning (CBC) dalam algoritma blowfish,” J. Ilmu Komput. Indones., vol. 5, no. 1, pp. 50–54, 2020.
D. A. A. Pertiwi and D. Djuniadi, “Simulations of text encryption and decryption by applying vertical bit rotation algorithm,” J. Soft Comput. Explor., vol. 2, no. 2, pp. 61–66, 2021.
W. Haryono, “Comparison encryption of how to work caesar cipher, hill cipher, blowfish and twofish,” J. Comput. Appl. Informatics, vol. 4, no. 2, pp. 100–110, 2020.
F. Laylim and M. Q. Khairuzzaman, “Penerapan algoritma twofish dalam perancangan aplikasi chat berbasis android,” J. ENTERJ, vol. Volume 2, pp. 76–87, 2019.
F. Khusnul, “Implementasi keamanan pengiriman pesan suara dengan enkripsi dan dekripsi menggunakan algoritma twofish,” vol. 1, no. 3, pp. 84–89, 2012.
B. P. Siswanto, Saputro, A., Utama, G. P., Prasetyo, “Penerapan algoritma kriptografi twofish untuk mengamankan data file,” J. BIT Budi Luhur Inf. Technol., vol. 18, no. 1, pp. 9–18, 2021.
I. Shulhan, “Analisis perbandingan antara algoritma rijndael dan algoritma twofish dalam penyandian teks,” J. Tek. Inform. Unika St. Thomas, vol. Vol.03, no. no.02, pp. 90–98, 2018.
I. P. G. H. Suweantara, E., Suputra, “Penggunaan metode kriptografi pada voice over internet protocolle,” J. SNATIA, pp. 473–479.
B. S. Setyawan, R. A., Sulistyo, S., Hantono, “Review: algoritma kriptografi untuk pengembangan aplikasi telepon anti sadap,” Proc. Conf. Inf. Technol. Electr. Eng., 2014.
A. Hendra, “Analisis perbandingan kinerja algoritma twofish dan tea (tiny encryption algorithm) pada data suara,” no. November, pp. 1–8, 1994.
M. O. Gurning, “Aplikasi pesan dengan algoritma twofish pada platform android messaging application with twofish algorithm on android platform,” vol. 3, no. 3, pp. 5022–5028, 2016.