p-ISSN: 2301-5373

e-ISSN: 2654-5101

Jurnal Elektronik Ilmu Komputer Udayana

Volume 9 No. 4, May 2021

The Security System For Web-Based Lontar Images In JPG Format Using The Rivest Shamir Adleman Method

Winda Riantya1, I Ketut Gede Suhartanaa2

aInformatics Department, Faculty of Math and Science, Udayana University

Bali, Indonesia 1[email protected] 2[email protected]

Abstract

The Security System for Web-Based Lontar Images in JPG Format Using the Rivest Shamir Adleman Method is a system that is basically used to secure an image in JPG format, which after the encryption process will be converted into txt. Where the system functions to secure lontar by using an encryption process using a cryptographic technique, namely Rivest Shamir Adleman (RSA) which is expected to help the public to maintain information or documentation and evidence of important events that occurred in the past.

Keywords: Security system, Cryptography, Rivest Shamir Adleman, Lontar, JPG.

  • 1.    Introduction

Technological developments make it easier for users to secure data that is deemed important, therefore data security is very much needed at this time. One way that can be used to secure data is to use mathematical techniques related to aspects of information security such as confidentiality, data integrity, and authentication[1].

The study of data security methods is known as cryptography. The application of data security using cryptography requires an algorithm to complicate security so that data is safe and there is no piracy by irresponsible parties. One of the most popular cryptographic algorithms at this time is the RSA (Rivest Shamir Adleman) algorithm. RSA is a symmetric algorithm method. The step in the RSA algorithm is to create a key pair, namely the public key and the private key[2].

Current technological developments help to perform security or encryption. One of the media that can be used is through a website, by using web media, users will be facilitated by not needing to download an application. If you want to use the system, you only have to access the URL, and it can be accessed on all devices.

Many data contain important information, one of the things that must be secured is lontar data. The palm data is in the form of an image in JPG format which will be secured using an encryption process. Lontar is a past text made from tal leaves, besides that lontar is also a very important source of information for the community, because from lontar people can get information or documentation and evidence of important events that occurred in the past. [3] therefore lontar can be used as a cultural reflection for the continuation of future generations. So in this case the author wants to develop a web for further use of securing JPG data which in turn can help secure data and increase the effectiveness and efficiency of its users.

  • 2.2    JPG

JPG format is a compressed lossy file format. This makes it useful to save photos at a size smaller than BMP. JPG is a common choice for use on the Web because it is compressed. JPG-shaped images are most often used to display realistic photos that look fine and can still keep the file size low.

  • 2.3    Cryptography

Cryptography comes from the Greek language by combining words from Greek, namely kryptos and graphein. Kryptos means hidden or secret, while graphein means writing. Cryptography is the science of encryption techniques where data is scrambled using an encryption key to become something that is difficult to read by someone who does not have a decryption key[4].

  • 2.4    Rivest Shamir Adleman

RSA stands for Rivest Shamir Adleman. The RSA Algortima was described in 1977 by three people: Ron (R) ivest, Adi (S) Hamir, and Leonard (A) dleman from the Massachusetts Institute of Technology. RSA in cryptography is an algorithm for public key encryption. RSA was the first algorithm suitable for digital signatures as well as encryption, and RSA is one of the most advanced methods in the field of public key cryptography[5].

  • 2.5    PHP

PHP is a programming language used to develop static websites, dynamic websites or web applications. PHP can be inserted between HTML language scripts and other server side language arenas, with that PHP will be executed directly on the server. Meanwhile, the browser will execute the web page through the server which will then receive a "finished result" display in HTML form, while the PHP code itself will not be visible[6[.

  • 2.6    Database (PhpMyAdmin)

PhpMyAdmin is free software written in the PHP programming language which is used to handle MySQL administration via the World Wide Web. PhpMyAdmin is a free (opensource) application / software written in the PHP programming language which is used to handle MySQL database administration via local networks or the internet. phpMyAdmin supports various MySQL operations, including (managing databases, tables, fields, relations, indexes, users, permissions, etc.)[7].

  • 2.7    System Design

  • a.    Flowmap of the running system

Proses sistem yang berjalan

Description of the system process flowmap is running

  • •    The user enters a website page, the website user page will see several options that he can choose from.

  • •  The user selects the Generate Key menu.

  • •   Then the system will display a form that will be filled out by the user.

  • •   The user will enter the values for p and q, to get the values for n and m.

  • •   Then the user enters the values d and e, to get the public key and private key.

  • •    After generating the key, the user will choose between the encryption or decryption process.

  • •    If the user selects encryption, the user will provide to insert a palm-shaped image in JGP format.

  • •    Then the user will enter the public key.

  • •    After the user enters the public key and clicks on encryption, the system will run the encryption process and if it is successful the encryption file can be downloaded by clicking the download button.

  • •    If the user chooses decryption, then the user will submit to enter an encrypted file with txt format.

  • •   Then the user will enter the private key.

  • •   After the user enters the private key and clicks on decrypt, the system will run the

decryption process and if it is successful the decrypted image file can be downloaded by clicking the download button.

3.

3.1.


Result and Discussion

Appplication View

In the application screen that has been created, there are 4 pages, namely the first page for selecting the menu, the second page for generating the key, the third page for image encryption and the last page for decrypting an encrypted image.

Figure 2. Homepage


Figure 3. Generate Key page display


In figure 3. The display when the user will generate a key to get a public key and a private key

Figure 4. Encryption Page Display

In figure 4. The display when the user will do the image encryption process by entering the image and private key

Figure 5. Decryption Page Display

In figure 5. The display when the user will do the file decryption process by entering the encryption file and the public key

  • 3.2.    System Testing

Application testing is carried out using black box testing which is used to determine the functionality of the application that has been made.

  • a.    Generate Key

To test whether the system is running properly when generating the key, I enter the values p, q, e and d and the system will generate a public key and a private key.

Kunci RSA

Nilai p

Nilai e

101

7                       ®

Nilai q

Nilai d

151

2143                                  ©

Nilai π

Public Key

15251

7,15251

Nilai m

Private Key

15000

2143,15251

Figure 6. Generate Key Process

In Figure 6., the user will be asked to enter the values for p and q then click generate key and it will generate the values for n and m. After that the user can choose the value e and value d to be entered then click generate key to get the public and private key.

  • b.    Encryption

To test whether the system is running properly at the time of encryption, the author

will


input the i

and enter the public

Figure 7. The process of inputting images and public keys

In figure 7. The user enters the image to be encrypted and enters the public key that was previously obtained to carry out the encryption process.

Input Image

Choose Image                                               Browse

Properties

File Name:

image Resolution:

Image Size :

RSA

Public Key

Masukan Public Key

Encryption                      Reset Data


5426.208.5426.7651.0.2605.10757.54633272.5463.0.1.1.1.0.6715.0.6715.0.0.5426.4 ^ 323,0.8,14671.10379.8647.12137.12207.8509.10379.7949.13169.5380,6665.4817.4 092.1847.2929.5380,13169,1024.121.2633.8512.13169.1598,9978.6773.3860.2841.

5380.13169.3272.10757.2175.13169.10757.6281.8647.2175.13169.1024.8117.1601. 10447.537.13169.3169.9978.2604.19083860.10906.1346.13169.12037.13169.6091. 8512.10595.5426.3145.0.14671.0.5418.1133.1870.5418.1870.1133.5418.5418.1870.

5418.15240.15240.5418.7765.10595.2605.10595.10595.9406.9406.10595.14072.13 843.2422.7209.2605.9195.14072.7692.7692.9195.14072.11085.11085.8285.3994.14 501.8374.8285.12574.9932.2788.11085.11085.13169.537.13169.9932.3173.7515.10 447.1406.10447.4421.8374.4817.8512.4817.1598.8512.14501 1598.10447.1598.542 63145.0.14671.1.15240.15240.15240.10595.7765.10595.10629.10595.10595.10629 .1598.8285.11085.8285.1593.1598.1598.1598.1598.1598.1598.1598.1598.1598.159 8.1598.1598.1598,1598.1598.1598.1598.1598.1598.1598.1598.1598.1598.1598.159 8 1598 1 SQS 159« 1598 1WmS⅞⅞ 1SQH 1598 1598 159« 1 SQS 159« 1598 1598 159 *


Oownload


Figure 8. Display of Results After the Encryption Process

In figure 8, after the user clicks on encryption, the system will run the encryption process and when successful, the system will display the results of the encryption and the user can download the encryption file by clicking the download button

  • c.    Decryption

To test whether the system is running properly at the time of decryption, the author will input the txt file from the previous encryption results and enter the private key.

4.

4.1


Figure 9. The process of entering the encryption file and private key

In figure 9, the user enters the file to be described and enters the private key that was

obtained to

the

.

Figure 10. Display Results After the Decryption Process.

In figure 10, after the user clicks decryption, the system will run the decryption process and when successful, the system will display the results of the decryption and the user can download the files that have been decrypted by clicking the download button

Conclusion and Suggestions

Conclusion

From the explanations that have been made in the previous chapters, it can be concluded that the lontar is an ancient manuscript that must be preserved and preserved so that these lontars can be used for the continuation of future generations. The lontar data can be stored and encrypted using a cryptographic security system, namely Rivest Shamir Adleman.

In this system, the analysis and design process has been successfully carried out. The analysis process involves diagrams, namely flowmaps. Implementation of the design into coding using the PHP programming language with the Laravel framework, the database using MySQL, and for display design using the Bootstrap CSS framework, resulting in an

image security system that can generate keys to get public and private keys, encryption and image decryption.

  • 4.2 Suggestions

  • a.    In this web development, it is hoped that it will be able to encrypt images with

different formats such as PNG.

  • b.    Can be used as a reference for developing a mobile version of the application for

encryption and decryption of palm-leaf images.

References

  • [1]    Munir, Rinaldi. (2006). “Diktat Kuliah IF2153 Matematika Diskrit. Program Studi Teknik Informatika, Institut Teknologi Bandung.

  • [2]    Fahreza, Harbani (2019). Jurnal Ilmiah Teknologi – Informasi dan Sains. “Aplikasi Keamanan Data Gambar Menggunakan Algoritma RSA (Rivest Shamir Adleman” Berbasis Desktop. Volume 9 Nomor 1 Bulan Mei 2019 Hal. 1-9. p-ISSN : 2087-3891 dan e-ISSN : 2597-8918

  • [3]    Sedana, Damayanti dan Khadijah. (2013). Jurnal Kajian Informasi & Perpustakaan. “Preservasi Berbasis Kearifan Lokal (Studi Kasus Mengenai Preservasi Preventif dan Kuratif Manuskrip Lontar Sebagai Warisan Budaya di Kabupaten Klungkung Bali)”. Vol.1/No.1, Juni 2013, hlm 91-105.

  • [4]    Eka Adhitya Dharmawan, Erni Yudaningtyas, M. Saora, Juni 2013, “Perlindungan Web pada Login Sistem Menggunakan Algoritma Rijndael” Jurnal EECCIS, Vol. 7, No.1.

  • [5]    Sentot Kromodimoeljo, Desember 2009, Teori & Aplikasi Kriptografi, SPK IT Consulting

  • [6]    KM. Syarif Haryana, Juni 2008, “Pengembangan Perangkat Lunak dengan Menggunakan PHP”, Jurnal Computech & Bisnis, Vol. 2, No. 1, 14-21 ISSN 1978-9629

  • [7]    Rahmawati Erma Standsyah, Intannia Sari Restu N.S., “Implementasi PHPMyAdmin pada Rancangan Sistem Pengadministrasian”. Jurnal UJMC, Volume 3, Nomor 2, Hal. 38 - 44 pISSN : 2460-3333 eISSN : 2579-907X

532