Text and Image Encryption Using Symmetric Cryptography Ron Rivest Cipher 2 (RC2)
DOI:
10.33395/sinkron.v9i1.13054Keywords:
RC2 Algorithm, Cryptography, PSNR, AVA, UACI, NPCRAbstract
In the current context, ensuring the secure transmission of data over the internet has become a critical concern, with information technology playing a fundamental role. As society advances into the digital information age, the importance of network security issues continues to increase. Therefore, the need for cryptographic technology has emerged to overcome these challenges. Cryptography includes symmetric and asymmetric cryptography. An example of symmetric cryptography is the RC2 algorithm. RC2 is a symmetric encryption algorithm that uses a single key to encrypt and decrypt data. The ciphertext is then concealed within an image using the Stepic technique. The RC2 encryption method also utilizes symmetric encryption, ensuring the security of the encryption process while maintaining efficient encryption and decryption speeds. The result of this research is that the average percentage of MSE is 0.00%, and for PSNR and AVA are 70.85% and 34.93%. However, the AVA value is quite unstable because the average value is below 40%. Meanwhile, image encryption results in the longer the text that needs to be hidden in the image, the higher the UACI percentage. This is inversely proportional to the NPCR, the longer the text that needs to be hidden in the image, the lower the NPCR percentage. The average results obtained for UACI and NPCR values are 41.46% dan 98.13%.
Downloads
References
Abed, S., Jaffal, R., Mohd, B. J., & Alshayeji, M. (2019). FPGA modeling and optimization of a SIMON lightweight block cipher. Sensors (Switzerland), 19(4). https://doi.org/10.3390/s19040913
Al-Shabi, M. A. (2019). A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security. International Journal of Scientific and Research Publications (IJSRP), 9(3), p8779. https://doi.org/10.29322/ijsrp.9.03.2019.p8779
Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2), 256–272.
Ali, H. J., Jawad, T. M., & Zuhair, H. (2021). Data security using random dynamic salting and AES based on master-slave keys for Iraqi dam management system. Indonesian Journal of Electrical Engineering and Computer Science, 23(2), 1018–1029. https://doi.org/10.11591/ijeecs.v23.i2.pp1018-1029
B. Savant, V., & D. Kasar, R. (2021). A Review on Network Security and Cryptography. In Research Journal of Engineering and Technology (pp. 110–114). https://doi.org/10.52711/2321-581x.2021.00019
Deshpande, K., & Singh, P. (2019). Global Journal Of Engineering Science And Researches. 418(C), 418–427.
Elgeldawi, E., Mahrous, M., & Sayed, A. (2019). A Comparative Analysis of Symmetric Algorithms in Cloud Computing: A Survey. International Journal of Computer Applications, 182(48), 7–16. https://doi.org/10.5120/ijca2019918726
Farissi, A., Pradata, A., & Miraswan, K. J. (2023). Securing Messages Using AES Algorithm and Blockchain Technology on Mobile Devices. 8(2), 1166–1171.
Ignatiev, A., Morgado, A., & Marques-Silva, J. (2019). RC2: an Efficient MaxSAT Solver. Journal on Satisfiability, Boolean Modeling and Computation, 11(1), 53–64. https://doi.org/10.3233/sat190116
Latif, I. H. (2020). Time Evaluation of Different Cryptography Algorithms Using Labview. IOP Conference Series: Materials Science and Engineering, 745(1). https://doi.org/10.1088/1757-899X/745/1/012039
Murugan, A. (2021). A Spiral Pattern Based DNA Cryptography Encryption Design. November.
Musa, K. (2023). Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security International Journal of Current Science Research and Review Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Secur. June. https://doi.org/10.47191/ijcsrr/V6-i6-12
Naser, S. M. (2021). Cryptography : From the Ancient History To Now , It ’ S Applications. International Journal of Mathematics and Statistics Studies, 9(August), 10–30. https://doi.org/10.13140/RG.2.2.13438.51524
Pujeri, D. U., & Pujeri, D. R. (2020). Symmetric Encryption Algorithm using ASCII Values. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 2355–2359. https://doi.org/10.35940/ijrte.e5980.018520
Rajesh, S., Paul, V., Menon, V. G., & Khosravi, M. R. (2019). A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry, 11(2). https://doi.org/10.3390/sym11020293
Rasha, A. T., Ali, H., & Jaddoa, S. H. (2019). Hiding Secret Text in Image Using Rc4 and Rijindeal Algorithm. Online), 6(1), 12–18. www.jifactor.com
Soni, G., Rawat, A., Jain, S., & Sharma, S. (2020). A Pixel-Based Digital Medical Images Protection Using Genetic Algorithm with LSB Watermark Technique (pp. 483–492). https://doi.org/10.1007/978-981-13-8406-6_46
Sood, R., & Kaur, H. (2023). A Literature Review on RSA, DES and AES Encryption Algorithms. 57–63.
Vashi*, D., Bhadka, D. H. B., Patel, D. K., & Garg, D. S. (2019). Performance of Symmetric and Asymmetric Encryption Techniques for Attribute Based Encryption. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 176–182. https://doi.org/10.35940/ijrte.c6597.118419
Yang, C., Ling, Y., & Li, X. (2020). Information encryption algorithm in power network communication security model. IOP Conference Series: Materials Science and Engineering, 750(1). https://doi.org/10.1088/1757-899X/750/1/012161
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2023 Saniya Rahma Pratiwi, Christy Atika Sari, Eko Hari Rachmawanto
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.