We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security

by Indrastanti R. Widiasari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 20
Year of Publication: 2012
Authors: Indrastanti R. Widiasari
10.5120/9227-3787

Indrastanti R. Widiasari . Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security. International Journal of Computer Applications. 57, 20 ( November 2012), 1-8. DOI=10.5120/9227-3787

@article{ 10.5120/9227-3787,
author = { Indrastanti R. Widiasari },
title = { Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 20 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number20/9227-3787/ },
doi = { 10.5120/9227-3787 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:00:56.877910+05:30
%A Indrastanti R. Widiasari
%T Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 20
%P 1-8
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The development of telecommunications technology and data storage using the computer has become a necessity because there are many jobs that can be completed quickly, accurately, and efficiently. In addition it allows data transmission distance is relatively fast and cheap, but on the other hand long-distance data transmission is possible others can tap into and alter transmitted data as the number of users that many in a computer network. Therefore, the system of data security and confidentiality of data is one important aspect in the development of the world of telecommunications, especially communications and using computers connected to the network. This research used a cryptographic algorithm Advanced Encryption Standard (AES) and One Time Pad (OTP) to encrypt the file. The merger is intended to cryptographic algorithms with low complexity is more than just using the existing cryptographic algorithms.

References
  1. Garfinkel, Simson, 1995, PGP: Pretty Good Privacy, O'Reilly & Associates, Inc.
  2. Munir, R. , 2006, Kriptografi, Penerbit Informatika, Bandung.
  3. Schneier, Bruce, 1996, Applied Cryptography, John Wiley & Sons.
  4. Stinson, Dough, 1995, Criptography, CRC Press, Inc.
  5. Munir, R. , 2004, Chipher yang tidak dapat dipecahkan,http://www. informatika. org/~rinaldi/Kriptografi/Unbreakable%20chiper. pdf (Diakses tanggal 19 Maret 2011).
  6. Saragih, F. R. , 2008, Penggunaan Kriptografi One Time Pad (Algoritma Vernam) dalam Pengamanan Informasi.
  7. Astutik, Duwi. , 2007, Algoritma Enkripsi One Time Pad untuk Sistem Pengamanan Access Database Server Menggunakan Bahasa Pemrograman Visual Basic,http://diglib. unnes. ac. id/gsdl/collect/skripsi/index/assoc/HASH04a4/d9c8b5eb. dir/doc. pdf (Diakses tanggal 2 Mei 2011).
  8. Kurniawan, Y. , 2004, Kriptografi, Keamanan Internet dan Jaringan Komunikasi, Penerbit Informatika, Bandung
  9. Manongga, Danny. , 2007, Matematika Diskrit, Salatiga : Fakultas Teknologi Informasi Universitas Kristen Satya Wacana.
  10. Bhattacharya, Palaka & Karyar, Morteza. , 2004, Translucent Databases: A Precursor to Privacy Sensitive Databases, CSCI E170- Security, Privacy, and Usability, Fall. pdf. (Diakses tanggal 12 Mei 2011).
  11. McLeod, Raymond, Jr. dan George Schell, 2001, Management Information System, Pretince Hall: New Jersey.
  12. Munir, R. , 2005, Matematika Diskrit, Penerbit Informatika, Bandung.
  13. Primanio. , 2007, Pemanfaatan Kembali Kriptografi Klasik dengan melakukan Modifikasi Metode-Metode Kriptografi yang Ada.
  14. Wayner, Peter. , 2002, Translucent Database, Baltimore MD.
Index Terms

Computer Science
Information Sciences

Keywords

Advanced Encryption Standard AES One Time Pad OTP encryption decryption