Super Encryption of Rabin Cryptosystem Algorithm and Paillier Cryptosystem Algorithm on Digital Image Security Process
DOI:
https://doi.org/10.59934/jaiea.v4i1.659Keywords:
Digital Image, Super Encryption, Rabin Cryptosystem Algorithm, Paillier Cryptosystem AlgorithmAbstract
Technological advances have given rise to the need for data protection, especially digital images, which are vulnerable to misuse. This research proposes a super encryption method that combines two cryptographic algorithms, namely Rabin Cryptosystem and Paillier Cryptosystem, to increase digital image security. Rabin's algorithm does not have homomorphism, so it is vulnerable to factorization attacks if the prime numbers used are too small. Meanwhile, the Paillier algorithm has homomorphism properties which allow arithmetic operations to be carried out directly on the ciphertext without decryption. By combining these two algorithms, this research aims to create a stronger and more efficient encryption method, and analyze its performance in terms of computational efficiency and complexity. It is hoped that the research results can improve the security and privacy of digital data, especially in the context of digital images.
Downloads
References
M. Azhari, D. I. Mulyana, F. J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” J. Pendidik. Sains dan Komput., vol. 2, no. 01, pp. 163–171, 2022, doi: 10.47709/jpsk.v2i01.1390.
A. C. Frobenius and E. R. Hidayat S. H. S, “Steganografi LSB Dengan Modifikasi Kriptografi: Caesar, Vigenere, Hill Cipher dan Playfair Pada Image,” Melek IT Inf. Technol. J., vol. 6, no. 1, pp. 33–40, 2020, doi: 10.30742/melek-it.v6i1.301.
R. K. Ramesh, R. Dodmane, S. Shetty, G. Aithal, M. Sahu, and A. K. Sahu, “A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem,” Cryptography, vol. 7, no. 3, 2023, doi: 10.3390/cryptography7030044.
EVAPIONA, Achmad Fauzi, and Milli Alfhi Syari, “Digital Image Security Implementation With Uses Super Encryption Algorithm Myszkowski And The Algorithm Paillier Cryptosystem,” J. Artif. Intell. Eng. Appl., vol. 3, no. 1, pp. 70–82, 2023, doi: 10.59934/jaiea.v3i1.262.
N. Z. Munantri, H. Sofyan, and M. Y. Florestiyanto, “Aplikasi Pengolahan Citra Digital Untuk Identifikasi Umur Pohon,” Telematika, vol. 16, no. 2, p. 97, 2020, doi: 10.31315/telematika.v16i2.3183.
S. Hariati, A. M. H. Pardede, and M. Sihombing, “Application of the DCT Algorithm to Protect Image Files with Key Symbols”, j. of artif. intell. and eng. appl., vol. 3, no. 3, pp. 618–623, Jun. 2024.
S. Hadi Keswara, A. Fauzi, and Nurhayati, “Image Processing for Freshness Identification Tilapia Using Backpropagation Algorithm (Case Study: Binjai City Food Security and Agriculture Office)”, j. of artif. intell. and eng. appl., vol. 3, no. 3, pp. 650–658, Jun. 2024.
R. Puspadini and M. P. U. Sitompul, “Implementation of the Laplacian of Gaussian Algorithm in Edge Detection Image Processing of Zebra Cross Damage on Highways in the Langkat Regency Area”, j. of artif. intell. and eng. appl., vol. 3, no. 2, pp. 601–605, Feb. 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.