Text and Image Encryption Using Symmetric Cryptography Ron Rivest Cipher 2 (RC2)

Authors

  • Saniya Rahma Pratiwi Informatics Engineering, University of Dian Nuswantoro, Semarang, Indonesia
  • Christy Atika Sari Informatics Engineering, University of Dian Nuswantoro, Semarang, Indonesia
  • Eko Hari Rachmawanto Informatics Engineering, University of Dian Nuswantoro, Semarang, Indonesia

DOI:

10.33395/sinkron.v9i1.13054

Keywords:

RC2 Algorithm, Cryptography, PSNR, AVA, UACI, NPCR

Abstract

In the current context, ensuring the secure transmission of data over the internet has become a critical concern, with information technology playing a fundamental role. As society advances into the digital information age, the importance of network security issues continues to increase. Therefore, the need for cryptographic technology has emerged to overcome these challenges. Cryptography includes symmetric and asymmetric cryptography. An example of symmetric cryptography is the RC2 algorithm. RC2 is a symmetric encryption algorithm that uses a single key to encrypt and decrypt data. The ciphertext is then concealed within an image using the Stepic technique. The RC2 encryption method also utilizes symmetric encryption, ensuring the security of the encryption process while maintaining efficient encryption and decryption speeds. The result of this research is that the average percentage of MSE is 0.00%, and for PSNR and AVA are 70.85% and 34.93%. However, the AVA value is quite unstable because the average value is below 40%. Meanwhile, image encryption results in the longer the text that needs to be hidden in the image, the higher the UACI percentage. This is inversely proportional to the NPCR, the longer the text that needs to be hidden in the image, the lower the NPCR percentage. The average results obtained for UACI and NPCR values are 41.46% dan 98.13%.

GS Cited Analysis

Downloads

Download data is not yet available.

Author Biographies

Christy Atika Sari, Informatics Engineering, University of Dian Nuswantoro, Semarang, Indonesia

Eko Hari Rachmawanto, Informatics Engineering, University of Dian Nuswantoro, Semarang, Indonesia

References

Abed, S., Jaffal, R., Mohd, B. J., & Alshayeji, M. (2019). FPGA modeling and optimization of a SIMON lightweight block cipher. Sensors (Switzerland), 19(4). https://doi.org/10.3390/s19040913

Al-Shabi, M. A. (2019). A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security. International Journal of Scientific and Research Publications (IJSRP), 9(3), p8779. https://doi.org/10.29322/ijsrp.9.03.2019.p8779

Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2), 256–272.

Ali, H. J., Jawad, T. M., & Zuhair, H. (2021). Data security using random dynamic salting and AES based on master-slave keys for Iraqi dam management system. Indonesian Journal of Electrical Engineering and Computer Science, 23(2), 1018–1029. https://doi.org/10.11591/ijeecs.v23.i2.pp1018-1029

B. Savant, V., & D. Kasar, R. (2021). A Review on Network Security and Cryptography. In Research Journal of Engineering and Technology (pp. 110–114). https://doi.org/10.52711/2321-581x.2021.00019

Deshpande, K., & Singh, P. (2019). Global Journal Of Engineering Science And Researches. 418(C), 418–427.

Elgeldawi, E., Mahrous, M., & Sayed, A. (2019). A Comparative Analysis of Symmetric Algorithms in Cloud Computing: A Survey. International Journal of Computer Applications, 182(48), 7–16. https://doi.org/10.5120/ijca2019918726

Farissi, A., Pradata, A., & Miraswan, K. J. (2023). Securing Messages Using AES Algorithm and Blockchain Technology on Mobile Devices. 8(2), 1166–1171.

Ignatiev, A., Morgado, A., & Marques-Silva, J. (2019). RC2: an Efficient MaxSAT Solver. Journal on Satisfiability, Boolean Modeling and Computation, 11(1), 53–64. https://doi.org/10.3233/sat190116

Latif, I. H. (2020). Time Evaluation of Different Cryptography Algorithms Using Labview. IOP Conference Series: Materials Science and Engineering, 745(1). https://doi.org/10.1088/1757-899X/745/1/012039

Murugan, A. (2021). A Spiral Pattern Based DNA Cryptography Encryption Design. November.

Musa, K. (2023). Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security International Journal of Current Science Research and Review Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Secur. June. https://doi.org/10.47191/ijcsrr/V6-i6-12

Naser, S. M. (2021). Cryptography : From the Ancient History To Now , It ’ S Applications. International Journal of Mathematics and Statistics Studies, 9(August), 10–30. https://doi.org/10.13140/RG.2.2.13438.51524

Pujeri, D. U., & Pujeri, D. R. (2020). Symmetric Encryption Algorithm using ASCII Values. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 2355–2359. https://doi.org/10.35940/ijrte.e5980.018520

Rajesh, S., Paul, V., Menon, V. G., & Khosravi, M. R. (2019). A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry, 11(2). https://doi.org/10.3390/sym11020293

Rasha, A. T., Ali, H., & Jaddoa, S. H. (2019). Hiding Secret Text in Image Using Rc4 and Rijindeal Algorithm. Online), 6(1), 12–18. www.jifactor.com

Soni, G., Rawat, A., Jain, S., & Sharma, S. (2020). A Pixel-Based Digital Medical Images Protection Using Genetic Algorithm with LSB Watermark Technique (pp. 483–492). https://doi.org/10.1007/978-981-13-8406-6_46

Sood, R., & Kaur, H. (2023). A Literature Review on RSA, DES and AES Encryption Algorithms. 57–63.

Vashi*, D., Bhadka, D. H. B., Patel, D. K., & Garg, D. S. (2019). Performance of Symmetric and Asymmetric Encryption Techniques for Attribute Based Encryption. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 176–182. https://doi.org/10.35940/ijrte.c6597.118419

Yang, C., Ling, Y., & Li, X. (2020). Information encryption algorithm in power network communication security model. IOP Conference Series: Materials Science and Engineering, 750(1). https://doi.org/10.1088/1757-899X/750/1/012161

Downloads


Crossmark Updates

How to Cite

Pratiwi, S. R., Sari, C. A., & Rachmawanto, E. H. (2024). Text and Image Encryption Using Symmetric Cryptography Ron Rivest Cipher 2 (RC2). Sinkron : Jurnal Dan Penelitian Teknik Informatika, 8(1), 10-19. https://doi.org/10.33395/sinkron.v9i1.13054