IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWORK USING LIBRARY CHILKAT ENCRYPTION ACTIVEX


MUCH AZIZ MUSLIM, ILKOM UNNES and BUDI PRASETIYO, ILKOM UNNES and ALAMSYAH, ILKOM UNNES (2016) IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWORK USING LIBRARY CHILKAT ENCRYPTION ACTIVEX. Journal of Theoretical and Applied Information Technology, 84 (3). pp. 370-375. ISSN 1992-8645

[thumbnail of Turnitin_Implementation_Twofish_Algorithm_for_Data_Security_in_a_Communication_Network_Using_Library_Chilkat_Encryption_ActivEx.pdf]
Preview
PDF
Download (2MB) | Preview
[thumbnail of IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWORK USING LIBRARY CHILKAT ENCRYPTION ACTIVEX]
Preview
PDF (IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWORK USING LIBRARY CHILKAT ENCRYPTION ACTIVEX) - Published Version
Download (2MB) | Preview

Abstract

Cryptography is required to secure the data networks communication. This study implements Twofish cryptographic algorithm using library Chilkat Encryption ActiveX Ms. Visual Basic. Twofish operate on a block of plaintext consisting of 128 bits. There are 3 steps in Twofish algorithm, the first step is divide input bit into 4 parts, the second step was performed XOR operation between bit input with a key, and the third step processing the input bits in 16 times Feistel network. To facilitate the implementation of the coding in Ms. Visual Basic we use Chilkat Encryption ActiveX. This research using agile methods with phases: plan, design, code, test, and release. Twofish algorithm implementation using Ms. Visual Basic and library Chilkat Encryption ActiveX can be used to secure the data. The data succeed to be encrypted or decrypted and irreversible. The program can be implemented to maintain the confidentiality of the data when transmitted over the Internet. The speed encryption process need 3 times longer than the decryption. Average of time in encryption process need 0,365 second, while decryption process need 0,0936 second

Item Type: Article
Uncontrolled Keywords: Data security, Twofish, Chilkat Encryption ActiveX
Subjects: T Technology > Information and Computer
Fakultas: Fakultas Matematika dan Ilmu Pengetahuan Alam > Ilmu Komputer, S1
Depositing User: mahargjo hapsoro adi
Date Deposited: 04 Oct 2019 14:52
Last Modified: 04 Oct 2019 14:52
URI: http://lib.unnes.ac.id/id/eprint/33055

Actions (login required)

View Item View Item