Website Design for Solving and Securing Confidential Files with the Asmuth Bloom Secret Sharing Protocol

Authors

  • Edward Fernando STMIK TIME
  • Edi
  • Octara Pribadi

DOI:

https://doi.org/10.59934/jaiea.v5i1.1481

Keywords:

cryptography, secret sharing, shadow, message, Asmuth Bloom method

Abstract

Conventional cryptographic algorithms cannot be applied to break a plaintext (message) into several ciphertexts because conventional cryptographic algorithms can only produce one ciphertext from a plaintext (message). In this case, a cryptographic protocol can be applied, namely the Asmuth-Bloom secret sharing protocol. The working process of the Asmuth-Bloom secret sharing protocol is divided into two parts, namely the shadow formation process and the shadow merging process. The shadow formation process will start from the process of filling in the message and the collection of d values ​​along with the values ​​​​of m, n and prime numbers p. After that, the process is continued by converting the message to ASCII Code. After that, each value will be processed according to the input d value so that a collection of shares is obtained. Meanwhile, the shadow merging process will start from filling in m shares. After that, the process is continued with the calculation of each character using the Chinese Remainder Theorem. The process will end with the merging of each character produced so that the original message is obtained. The results of this study are in the form of a website-based application that provides an interface to carry out the process of breaking text files into n shadow files and merging m shadow files into the original text file.

Downloads

Download data is not yet available.

References

W. S. Raharjo, A. Rachmat C. dan P. Nadirio A., “Implementasi Secure Multi-Party Computation Menggunakan Metode Shamir Secret Sharing pada Pengamanan Dokumen Digital Rahasia,” JUISI, vol. 04, no. 01, pp. 1-9, 2018.

Khairani dan M. Z. Siambaton, “Pengamanan Data Teks Menggunakan Algoritma Kriptografi Elgamal dan XOR dari Serangan Hacker,” SUDO: Jurnal Teknik Informatika, vol. 2, no. 4, pp. 1-12, 2023.

Sugianto, Jimmy, A. Suwandhi, Wilianto dan Benny, “Analisis Metode Secret Sharing Asmuth-Bloom Dan Visual Cryptography,” Jurnal Minfo Polgan, vol. 13, no. 1, pp. 213-218, 2024.

R. S. Sinaga, S. Purba dan R. M. Siburian, “Aplikasi Pemahaman dan Penerapan Fast (k,n) Threshold Secret Sharing Scheme,” Jurnal Teknologi Informasi dan Indutri, vol. 3, no. 1, pp. 76-83, 2023.

E. A. Tarigan, “Perancangan Aplikasi Terenkripsi Dengan Menerapkan Metode Secret Sharing Asmuth Bloom,” Jurnal Riset Komputer (JURIKOM), vol. 5, no. 6, pp. 648-652, 2018.

I. S. Beno, “Analisis Teorema Sisa Cinadalan Dekripsi Data Text Terenkripsi RSA,” KOMBROF Jurnal Teknologi Informasi Papua(KJTIP), vol. 1, no. 1, pp. 40-44, 2023.

Z. Panjaitan, K. Ibnutama dan M. Suryanata, “Penggunaan Chinese Reminder Theorem (CRT) pada Algoritma RSA,” Sains dan Komputer (SAINTIKOM), vol. 18, no. 1, pp. 41-46, 2019.

C. O. Purba, “Implementasi Metode Chinese Remainder Theorem Untuk Menyisipkan Citra Digital Kedalam File Video,” Jurnal Sains Dan Teknologi Informasi, vol. 1, no. 3, pp. 67-72, 2022.

Downloads

Published

2025-10-15

How to Cite

Fernando, E., Edi, & Pribadi, O. (2025). Website Design for Solving and Securing Confidential Files with the Asmuth Bloom Secret Sharing Protocol. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 5(1), 822–830. https://doi.org/10.59934/jaiea.v5i1.1481