Website Design for Solving and Securing Confidential Files with the Asmuth Bloom Secret Sharing Protocol
DOI:
https://doi.org/10.59934/jaiea.v5i1.1481Keywords:
cryptography, secret sharing, shadow, message, Asmuth Bloom methodAbstract
Conventional cryptographic algorithms cannot be applied to break a plaintext (message) into several ciphertexts because conventional cryptographic algorithms can only produce one ciphertext from a plaintext (message). In this case, a cryptographic protocol can be applied, namely the Asmuth-Bloom secret sharing protocol. The working process of the Asmuth-Bloom secret sharing protocol is divided into two parts, namely the shadow formation process and the shadow merging process. The shadow formation process will start from the process of filling in the message and the collection of d values along with the values of m, n and prime numbers p. After that, the process is continued by converting the message to ASCII Code. After that, each value will be processed according to the input d value so that a collection of shares is obtained. Meanwhile, the shadow merging process will start from filling in m shares. After that, the process is continued with the calculation of each character using the Chinese Remainder Theorem. The process will end with the merging of each character produced so that the original message is obtained. The results of this study are in the form of a website-based application that provides an interface to carry out the process of breaking text files into n shadow files and merging m shadow files into the original text file.
Downloads
References
W. S. Raharjo, A. Rachmat C. dan P. Nadirio A., “Implementasi Secure Multi-Party Computation Menggunakan Metode Shamir Secret Sharing pada Pengamanan Dokumen Digital Rahasia,” JUISI, vol. 04, no. 01, pp. 1-9, 2018.
Khairani dan M. Z. Siambaton, “Pengamanan Data Teks Menggunakan Algoritma Kriptografi Elgamal dan XOR dari Serangan Hacker,” SUDO: Jurnal Teknik Informatika, vol. 2, no. 4, pp. 1-12, 2023.
Sugianto, Jimmy, A. Suwandhi, Wilianto dan Benny, “Analisis Metode Secret Sharing Asmuth-Bloom Dan Visual Cryptography,” Jurnal Minfo Polgan, vol. 13, no. 1, pp. 213-218, 2024.
R. S. Sinaga, S. Purba dan R. M. Siburian, “Aplikasi Pemahaman dan Penerapan Fast (k,n) Threshold Secret Sharing Scheme,” Jurnal Teknologi Informasi dan Indutri, vol. 3, no. 1, pp. 76-83, 2023.
E. A. Tarigan, “Perancangan Aplikasi Terenkripsi Dengan Menerapkan Metode Secret Sharing Asmuth Bloom,” Jurnal Riset Komputer (JURIKOM), vol. 5, no. 6, pp. 648-652, 2018.
I. S. Beno, “Analisis Teorema Sisa Cinadalan Dekripsi Data Text Terenkripsi RSA,” KOMBROF Jurnal Teknologi Informasi Papua(KJTIP), vol. 1, no. 1, pp. 40-44, 2023.
Z. Panjaitan, K. Ibnutama dan M. Suryanata, “Penggunaan Chinese Reminder Theorem (CRT) pada Algoritma RSA,” Sains dan Komputer (SAINTIKOM), vol. 18, no. 1, pp. 41-46, 2019.
C. O. Purba, “Implementasi Metode Chinese Remainder Theorem Untuk Menyisipkan Citra Digital Kedalam File Video,” Jurnal Sains Dan Teknologi Informasi, vol. 1, no. 3, pp. 67-72, 2022.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.







