ARTÍCULO
TITULO

Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization

Nihayatus Sa'adah    
I Gede Puja Astawa    
Amang Sudarsono    

Resumen

Security is a major concern of the internet world because the development of the Internet requires the security of data transmission. The security method helps us to store valuable information and send it over an insecure network so that it can not be read by anyone except the intended recipient. Security algorithm uses data randomization method. This method of data information randomization has a low computation time with a large number of bits when compared to other encryption algorithms. In general, the encryption algorithm is used to encrypt data information, but in this research the encryption algorithm is used for synchronization between the sender and the intended recipient. Number of bits on asymmetric key algorithm for synchronization are the 64-bits, 512-bits and 1024-bits. We will prove that security methods can secure data sent with low computational time with large number of bits. In the result will be shown the value of computing time with variable number of bits sent. When data are sent by 50 bytes, encryption time required 2 ms using 1024 bits for synchronization technique asymmetric key algorithm. 

 Artículos similares

       
 
Giriraj Sharma, Amit M. Joshi and Saraju P. Mohanty    
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids. Data and device security plays a pivotal role in smart grids since they are vulnerable to var... ver más
Revista: Information

 
Muhammad Alfian, Umi Laili Yuhana, Eric Pardede and Akbar Noto Ponco Bimantoro    
Assessment is one benchmark in measuring students? abilities. However, assessment results cannot necessarily be trusted, because students sometimes cheat or even guess in answering the questions. Therefore, to obtain valid results, it is necessary to sep... ver más
Revista: Information

 
Dmitry Namiot,Eugene Ilyushin,Oleg Pilipenko     Pág. 119 - 127
The development and use of artificial intelligence systems (machine learning) in critical areas (avionics, autonomous movement, etc.) inevitably raise the question of the reliability of the software used. Trusted computing systems have been around for a ... ver más

 
Yongbo Jiang, Yuan Zhou and Tao Feng    
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use enc... ver más
Revista: Information

 
Maryam Pahlevan and Valentin Ionita    
In recent years, sharing threat information has been one of the most suggested solutions for combating the ever-increasing number of cyberattacks, which stem from the system-wide adoption of Information and Communication Technology (ICT) and consequently... ver más
Revista: Information