Super Encryption of Rabin Cryptosystem Algorithm and Paillier Cryptosystem Algorithm on Digital Image Security Process

Authors

  • Dika Ramanda STMIK KAPUTAMA
  • Achmad Fauzi STMIK KAPUTAMA
  • Victor Maruli Pakpahan STMIK KAPUTAMA

DOI:

https://doi.org/10.59934/jaiea.v4i1.659

Keywords:

Digital Image, Super Encryption, Rabin Cryptosystem Algorithm, Paillier Cryptosystem Algorithm

Abstract

Technological advances have given rise to the need for data protection, especially digital images, which are vulnerable to misuse. This research proposes a super encryption method that combines two cryptographic algorithms, namely Rabin Cryptosystem and Paillier Cryptosystem, to increase digital image security. Rabin's algorithm does not have homomorphism, so it is vulnerable to factorization attacks if the prime numbers used are too small. Meanwhile, the Paillier algorithm has homomorphism properties which allow arithmetic operations to be carried out directly on the ciphertext without decryption. By combining these two algorithms, this research aims to create a stronger and more efficient encryption method, and analyze its performance in terms of computational efficiency and complexity. It is hoped that the research results can improve the security and privacy of digital data, especially in the context of digital images.

Downloads

Download data is not yet available.

References

M. Azhari, D. I. Mulyana, F. J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” J. Pendidik. Sains dan Komput., vol. 2, no. 01, pp. 163–171, 2022, doi: 10.47709/jpsk.v2i01.1390.

A. C. Frobenius and E. R. Hidayat S. H. S, “Steganografi LSB Dengan Modifikasi Kriptografi: Caesar, Vigenere, Hill Cipher dan Playfair Pada Image,” Melek IT Inf. Technol. J., vol. 6, no. 1, pp. 33–40, 2020, doi: 10.30742/melek-it.v6i1.301.

R. K. Ramesh, R. Dodmane, S. Shetty, G. Aithal, M. Sahu, and A. K. Sahu, “A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem,” Cryptography, vol. 7, no. 3, 2023, doi: 10.3390/cryptography7030044.

EVAPIONA, Achmad Fauzi, and Milli Alfhi Syari, “Digital Image Security Implementation With Uses Super Encryption Algorithm Myszkowski And The Algorithm Paillier Cryptosystem,” J. Artif. Intell. Eng. Appl., vol. 3, no. 1, pp. 70–82, 2023, doi: 10.59934/jaiea.v3i1.262.

N. Z. Munantri, H. Sofyan, and M. Y. Florestiyanto, “Aplikasi Pengolahan Citra Digital Untuk Identifikasi Umur Pohon,” Telematika, vol. 16, no. 2, p. 97, 2020, doi: 10.31315/telematika.v16i2.3183.

S. Hariati, A. M. H. Pardede, and M. Sihombing, “Application of the DCT Algorithm to Protect Image Files with Key Symbols”, j. of artif. intell. and eng. appl., vol. 3, no. 3, pp. 618–623, Jun. 2024.

S. Hadi Keswara, A. Fauzi, and Nurhayati, “Image Processing for Freshness Identification Tilapia Using Backpropagation Algorithm (Case Study: Binjai City Food Security and Agriculture Office)”, j. of artif. intell. and eng. appl., vol. 3, no. 3, pp. 650–658, Jun. 2024.

R. Puspadini and M. P. U. Sitompul, “Implementation of the Laplacian of Gaussian Algorithm in Edge Detection Image Processing of Zebra Cross Damage on Highways in the Langkat Regency Area”, j. of artif. intell. and eng. appl., vol. 3, no. 2, pp. 601–605, Feb. 2024.

Downloads

Published

2024-10-15

How to Cite

Ramanda, D., Achmad Fauzi, & Pakpahan, V. M. (2024). Super Encryption of Rabin Cryptosystem Algorithm and Paillier Cryptosystem Algorithm on Digital Image Security Process. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 4(1), 467–478. https://doi.org/10.59934/jaiea.v4i1.659