CRYPTOGRAPHY ON AUDIO FILES USING THE BLOWFISH ALGORITHM

NUNIEK FAHRIANI, ONNY KARTIKA WALUYA

Abstract


Blowfish is a 64-bit block cipher with variable key length. The algorithm consists of two part: Key expansion and
data encryption. Allowing its use in cryptography. In general, cryptography is about constructing and analyze
communication protocols that can block an opponent. Various aspects of information security, Such as confidential
data, Data integrity, Authentication and non repudance Is the center of modern cryptography. This case
implementation with encryption and decryption techniques on audio files using java programming, aims to secure
the audio data contained in it can be maintained and can only be read by user who have the cryptographic key.
Keywords: encryption, decryption, blowfish, java.


Full Text:

PDF

References


A. Eko, and Smitdev Community, “Buku anti forensik uncensored mengatasi investigasi komputer forensik,â€

PT Elekmedia Komputindo, Jakarta, pp. 71, 2010.

John D. Howard. 1997. “An Analysis Of Security Incidents On The Internet 1989 - 1995,†PhD thesis,

Engineering and Public Policy, Carnegie Mellon University.

S. Garfinkel.1995. “PGP: Pretty Good Privacy,†O’Reilly & Associates, Inc.,

Bhardwaj Akashdeep, dkk. 2016 . “Security Algorithm For Cloud Computingâ€. International conference on

computational modeling and security (CMS).

A. Dony “Pengantar Ilmu Kriptografi : teori analisis & implementasi “, STMIK Amikom ,Penerbit Andi 2008

Simarjeet Kaur “Cryptography and Encryption in Cloud Computingâ€, VSRD International Journal of CS and

IT, 2012

A. N Paskalis , "Penerapan Enkripsi ALgoritma Blowfish Pada Proses Steganografi EOF," Universitas Katolik

Widya Mandira, Kupang,.

Y. Aahmad. “Panduan Membangun Jaringan Komputerâ€. Kawan Pustaka 2009

Rahardjo Budi. “ Keamanan Sistem Informasi Berbasis Internet, versi 5.4. PT Insan Infonesia - Bandung & PT

INDOCISC. 2005

CharlesS A., Sennewald and Curtis bailie. “Effective Security Management (Sixt Edition) “ ISBN: 978-0-12-

-5. Elseiver Inc. 2016

Mohan V. Pawar, Anuradha J.“Network Security and Types of Attacks in Network“, International Conference

on Intelligent Computing, Communication & Convergence , 503-506 Odisha, India. 2015

Todd Lamle. CompTIA Network + Study Guide 2nd Edition. Indianapolis: John Wiley & Sons. 2012


Refbacks

  • There are currently no refbacks.