Tiny encryption algorithm (TEA) for analysis and implementation of cryptool2-based text message encryption and decryption processes
Main Article Content
Abstract
Data security is one of the main factors in the world of information technology. The human need for information is increasing along with the changing times today. To maintain the authenticity of the information presented, it is necessary to have a high level of security. In this study, a data security simulation will be designed using the TEA (Tiny Encryption Algorithm) algorithm which includes a block cipher encryption algorithm and includes a symmetric key cryptography algorithm with the advantage of being on the Feistel network. The practicum was analyzed based on the process of encrypting and decrypting messages in text format. The software used to simulate the TEA (Tiny Encryption Algorithm) algorithm using Cryptool2 software which is open source software is used to explain the concept of cryptography. This research is used to decipher, schema, and implement the TEA (Tiny Encryption Algorithm) algorithm in the form of simulating encryption and decryption of text messages (both text and text files) so that text messages are sent in the safest way from the sender to the recipient.
Article Details
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
Husna, A., Hulu, J. M., & Hondro, Y. S. (2020). Implementasi Algoritma Tiny Encryption Algorithm Untuk Pengamanan File PDF. Seminar Nasional Teknologi Komputer & Sains (SAINTEKS), 490–494. https://prosiding.seminar-id.com/index.php/sainteks/article/view/483
Ibrahim, R. N. (2019). Perangkat Lunak Keamanan Data Menggunakan Algoritma Kriptografi Simetri Tiny Encryption Algorithm (TEA). Jurnal Computech Dan Bismis, 13(1), 1–10. https://doi.org/10.5281/ZENODO.3625286
Maricar, M. A., & Sastra, N. P. (2018). Efektivitas Pesan Teks Dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi. Majalah Ilmiah Teknologi Elektro, 17(1), 59. https://doi.org/10.24843/MITE.2018.v17i01.P08
Marlando, P., Wamiliana, & Andrian, R. (2016). Analisis Perbandingan Algoritma Simetris Tiny Encryption Algorithm dan LOKI Dalam Enkripsi dan Deskripsi Data. Jurnal Komputasi, 4(1), 36–42. https://jurnal.fmipa.unila.ac.id/index.php/komputasi/article/view/1153
Mulya, M. F., & Rismawati, N. (2019). Analisis dan Simulasi Algoritma TEA (Tiny Encription Algorithm) Untuk Enkripsi dan Deskripsi Pesan Teks Menggunakan Cryptool2. Jurnal Sistem Komputer Dan Kecerdasan Buatan, 3(1), 31–38. https://jurnal.tau.ac.id/index.php/siskom-kb/article/view/79
Natsir, M. (2017). Pengembangan Prototype Sistem Kriptografi untuk Enkripsi dan Dekripsi Data Office Menggunakan Metode Blowfish dengan Bahasa Pemrograman Java. Format, 6(1), 87–105. https://www.neliti.com/publications/224661/pengembangan-prototype-sistem-kriptografi-untuk-enkripsi-dan-dekripsi-data-offic
Prasetiyo, B., Muslim, M. A., & Susanto, H. (2017). Penerapan Kriptografi Algoritma Blowfish pada Pengamanan Pesan Data Teks. Techno, 16(4), 358–366. http://dx.doi.org/10.33633/tc.v16i4.1452
Qamal, M. (2014). Kriptografi File Citra Menggunakan Algoritma TEA (Tiny Encription Algorithm). Jurnal TECHSI (Teknik Informatika), 6(2), 11–22. https://ojs.unimal.ac.id/techsi/article/view/174
Rismawati, N., & Mulya, M. F. (2019a). Analisis dan Perancangan Simulasi Enkripsi dan Dekripsi pada Algoritma Steganografi untuk Penyisipan Pesan Text pada Image menggunakan Metode Least Significant Bit (LSB) Berbasis Cryptool2. Faktor Exacta, 12(2), 132. https://doi.org/10.30998/faktorexacta.v12i2.3527
Rismawati, N., & Mulya, M. F. (2019b). Analisis dan Perancangan Simulasi Enkripsi dan Dekripsi pada Algoritma Steganografi untuk Penyisipan Pesan Text pada Image menggunakan Metode Least Significant Bit (LSB) Berbasis Cryptool2. Faktor Exacta, 12(2), 132. https://doi.org/10.30998/faktorexacta.v12i2.3527