Voice Encryption and Decryption Using AES 128b Method With Secret Key

Fajar Nugraha, Toni Arifin

Abstract


Sending or exchanging data is something that often happens in the world of information technology. One of the data that is usually exchanged is voice. Voice is usually used to communicate. The data sent is sometimes important and even very confidential and must be kept safe. To maintain data security, it can be done using cryptography. One of the cryptographic techniques is the Advanced Encryption Standard or commonly called AES. There are three types of AES, they are AES-128, AES-192, and AES-256. Sending data via wireless sometimes there is noise, so the data sent is not the same as what is received. To overcome this, it can be done by forwarding Error Correction (FEC), which is a method that can correct errors from the transmitted information. To encrypt the information from the audio in this study added and controlled by the Secret key Controller and another Interleaver must be added to the output controlled by the Secret key Controller. This study aims to perform cryptography on voice to maintain data security by using the Advanced Encryption Standard (AES) cryptographic technique with test parameters namely time, file size, and SNR value. The results in this study obtained good encryption with an average filter of 400Hz.


Full Text:

PDF

References


E. A. Wibowo, “Penggunaan Teknologi E-Commerce dalam Proses Bisnis,” Equilibiria, vol. 1, no. 1, pp. 95–108, 2016, [Online]. Available: http://journal.unrika.ac.id/index.php/equi/article/view/222.

R. Munir, “Slide Kuliah Pengantar Kriptografi,” J. Ilmu Komput. dan Inform., 2019.

W. Steven, V. Afriyandi, and K. M. Suryaningrum, “Implementasi Algoritma Ez Stego Untuk Menyembunyikan Pesan Terenkripsi Dengan Playfair Cipher Pada Gambar GIF,” vol. 5, no. 2, 2019.

M. Natsir, "Kemajuan Prototipe Sistem Kriptografi untuk Enkripsi dan Dekripsi Data Kantor," Jurnal, vol. 6, hlm. 2089–5615, 2016.

I. J. Kusuma, “Investigation of Steganography Techniques on MP3 Audio Using Parity Coding and Cipher Transposition Encryption Methods,” J. Elektron. Sist. Inf. dan Komput. p. ISSN 2477-5290 e. ISSN 2502-2148, vol. 3, no. 2, 2017, [Online]. Available: http://www.jesik.web.id/index.php/jesik/article/download/65/44%0A.

S. Rahmawati, I. Taufik, and G. Sandi, "Execution of AES (Advanced Encryption Standard) 256 Bit Algorithm and Compression Using the Huffman Algorithm in Voice Recorder Applications," Proceedings-Seminar Nas. Technology. Electrical Engineering UIN Sunan Gunung Djati Bandung, hlm. 91–99, 2018.

H. Patricia, “Teknik Keamanan Data Menggunakan Kriptografi dengan Algoritma Vigenere Cipher dan Steganografi dengan Metode End of File (EoF),” Progr. Stud. Tek. Inform. Fak. Ilmu Komput. Univ. Dian Nuswantoro, pp. 1–7, 2018.

J. Caesar, “Bagian II KRIPTOGRAFI Alasan dan Sejarah Kriptografi Pengertian Kriptografi ( Pendahuluan Kriptografi ) Istilah-istilah yang Digunakan Notasi Matematis,” no. 1, pp. 1–14, 2018.

I. Febriana and G. A. S, "Use of Cryptographic Techniques in Sms Android Security," JOIST (Journal of Educ. Inf. Commun. Technol., vol. 1, no. 1, pp. 29–36, 2017.

P. D. S. Kunjung Wahyudi, “Aplikasi kriptografi untuk pesan perdagangan menggunakan steganografi dan prosedur yippee AES,” Pros. Semin. Nas. Teknoin, no. January 2011, pp. 67–72, 2018.

A. J. Dedi Darwis, Wamiliana Wamiliana, “Proses Pengamanan Data Menggunakan Kombinasi Metode Kriptografi Data Encryption Standard dan Steganografi End Of File,” 2017.

K. Khairunnisa, N. Nurkamilia, and Z. Zuraidah, “Analisis Signal-To-Noise Ratio Pada Sinyal Audio Dengan Teknik Konvolusi,” J. ELTIKOM, vol. 2, no. 2, pp. 78–86, 2018, doi: 10.31961/eltikom.v2i2.84.

I. Hadi, “Rancang bangun filter portable,” J. Teliska, vol. 4, no. 3, pp. 61–67, 2012.

D. Almanda, E. Dermawan, D. Ery, Syawaluddin, and I. R. Anwar, “Investigasi Desain Filter Teredam Lintas Tinggi untuk Beban FL-4 pada PL-LB/2 Berdasarkan ETAP,” J. Teknol., vol. 10, no. 2, pp. 161–166, 2018.

H. Herwanto, “Diagnosis Faktual Pemahaman Bahasa Pemrograman Pemetaan Sebagai Acuan Penelitian Mahasiswa,” Nuansa Inform., vol. 13, no. 2, p. 33, 2019, doi: 10.25134/nuansa.v13i2.1950.




DOI: https://doi.org/10.32520/stmsi.v11i1.1627

Article Metrics

Abstract view : 346 times
PDF - 148 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
https://journals.uol.edu.pk/sugar-rush/http://mysimpeg.gowakab.go.id/mysimpeg/aset/https://jurnal.jsa.ikippgriptk.ac.id/plugins/https://ppid.cimahikota.go.id/assets/demo/https://journals.zetech.ac.ke/scatter-hitam/https://silasa.sarolangunkab.go.id/swal/https://sipirus.sukabumikab.go.id/storage/uploads/-/sthai/https://sipirus.sukabumikab.go.id/storage/uploads/-/stoto/https://alwasilahlilhasanah.ac.id/starlight-princess-1000/https://www.remap.ugto.mx/pages/slot-luar-negeri-winrate-tertinggi/https://waper.serdangbedagaikab.go.id/storage/sgacor/https://waper.serdangbedagaikab.go.id/public/images/qrcode/slot-dana/https://siipbang.katingankab.go.id/storage_old/maxwin/https://waper.serdangbedagaikab.go.id/public/img/cover/10k/https://waper.serdangbedagaikab.go.id/storage/app/https://waper.serdangbedagaikab.go.id/storage/idn/