Aplikasi Algoritma Kriptografi dan Steganografi untuk Keamanan Informasi Berbasis Teks
This study will produce a system of text-based information security applications using
cryptography algorithms Hill Code and Steganography LSB (Least Significant Bit). System
information security applications are built to be used for text-based data security. The algorithms
used for cryptography is Hill Code with a matrix of 2 x 2sebagai encryption keys, whereas the
description used for the inverse of a matrix initial key. Steganography algorithm used is the LSB
(Least Significant Bit) insertion in every bit of content (confidential data) into a low bit or bits of the
far right. As known to a bitmap (.bmp) 24 bits consist of three pixels in which each pixel is a collection
of 8 bits or 1 byte (a value between 0 to 255atau in binary format between 00000000 to 11111111),
who presented the value of the intensity of the light that forms the base color namely red, green or
blue (red-green-Blue or RGB). Thus in each pixel can be inserted 3 content. The results of the
implementation and testing of the system shows that the system is running well, the implementation of
the algorithm results are consistent with the manual calculation.
Keywords: Information Security, Cryptography, Steganography, Hill Code, Least Significant Bit
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).