SlideShare a Scribd company logo
Copyright © 2018 Robbi Rahim. This is an open access article distributed under the Creative Commons Attribution License, which permits unre-
stricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
International Journal of Engineering & Technology, 7 (3.2) (2018) 783-785
International Journal of Engineering & Technology
Website: www.sciencepubco.com/index.php/IJET
Research paper
Application of Data Encryption Standard and
Lempel-Ziv-Welch Algorithm for File Security
Ida Bagus Ary Indra Iswara1
, I Ketut Sudarsana2
, Nurlaidy Joice Simamora3
, Vivi Novalia Sitinjak3
, Nurhayati
Purba3
, Citra Kurniawan4
, Nurul Aziza5
, Dheasy Herawati5
, Dian Rianita6
, Hengki Mangiring Parulian Simarma-
ta7
, Elita Modesta Br Sembiring3
, Ari Riswanto8
, Rosida Tiurma Manurung9
, Sofwan Hadi10
, M Mesiono11
, Andys-
ah Putera Utama Siahaan12
, Wirda Fitriani12
, Diana Suita13
, Ramadhona Simbolon14
, Robbi Rahim15*
1
STMIK STIKOM Indonesia, Denpasar, Indonesia
2
Institut Hindu Dharma Negeri, Denpasar, Indonesia
3
Universitas Methodist Indonesia, Medan, Indonesia
4
Department of Electrical Engineering, Sekolah Tinggi Teknik Malang, Indonesia.
5
Universitas Maarif Hasyim latif, Sidoarjo, Indonesia
6
Universitas Lancang Kuning, Pekanbaru, Indonesia
7
Politeknik Bisnis Indonesia, Indonesia
8
Economic Education and Management, STKIP PGRI Sukabumi, Indonesia
9
Graduate Program in Scientific Psychology, Universitas Kristen Maranatha, Bandung, Indonesia
10
IAIN Ponorogo, Indonesia
11
Universitas Islam Negeri Sumatera Utara, Medan, Indonesia
12
Universitas Pembangunan Pancabudi, Medan, Indonesia
13
Universitas Harapan Medan, Medan, Indonesia
14
Universitas Islam Sumatera Utara, Medan, Indonesia
15
Sekolah Tinggi Ilmu Manajemen Sukma, Medan, Indonesia
*Corresponding author E-mail: usurobbi85@zoho.com
Abstract
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate
cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to
get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly
Keywords: Security, Data Transmission, Data Encryption Standard, Lempel-Ziv-Welch
1. Introduction
Security and confidentiality issues are an important aspect of data,
messages and information[1]–[5]. Delivery of a message, data and
information of great importance requires a high level of security.
With the development of today information is so fast where eve-
ryone will be easy to get a message, data and information, it make
various ways people do to get the data and information[6]–[11].
Starting from the easy level to the more complicated ways, and
many people also try to protect the message so that it cannot be
known by people who do not have rights to the message or
data[12]–[16].
Addition to the process of securing the data or information also
needs to be done the process of measuring the size of a data
(Compression)[17], [18]. The purpose of this compression is to
speed up the transmission of data or information[19]. Data com-
pression also aims to reduce the size of data and can be stored on
storage media that has a relatively small size. Security and speed
are important in communication using computers and computer
networks[20], [21].
Data Encryption Standard (DES) algorithm are one of the most
widely used encryption algorithm in the world[9], [22]. In general,
the data encryption standard is divided into three groups, namely
key processing, 64 bit encryption and 64 bit data description in
which each group will interact with each other. Because DES
algorithm has been widely used then here the authors will do a
merger of the DES algorithm and LZW algorithm[20], [23], so
that the level of security obtained higher and expected data or
information cannot be read easily by irresponsible parties.
2. Methodology
A. Cryptography
Cryptography has an important role in the world of computers.
This is caused because the number of confidential information that
is stored and sent through computer media[24], [25]. This infor-
mation usually contains document documents important financial
784 International Journal of Engineering & Technology
data from an agency that do not want to be read by unauthorized
person on the information.
In general, Cryptography is an information security technique that
is done by processing plaintext by using a certain encryption algo-
rithm and producing ciphertext that cannot be read directly.
Cryptography has a very long and amazing history. Most of the
history of Cryptography is part of classical cryptography, which is
a cryptographic method that uses paper and pencil or uses simple
mechanical aids to date that already use mathematical calculations
like the DES (Data Encryption Standard) algorithm.
DES is a block cipher algorithm that belongs to a cryptographic
system of symmetry[26]. DES operates on a 64 bit block size.
DES encrypts 64 bits of plaintext into 64 bit ciphertext using 56
bits of internal keys. The internal keys on the DES Algorithm are
generated from external keys that are 64 bits long[27].
B. Compression
Data compression is the science or art of representing information
in a more compact form. The purpose of data compression is to
represent a digital data with as few bits as possible, but retain the
minimum requirement to reshape the original data (decompres-
sion)[28].
The Lempel-Ziv-Welch (LZW) algorithm, developed by Abraham
Lempel, Jacob Ziv, and Terry Welch. This algorithm reduces the
number of tokens required to 1 symbol only[23], [28]. This sym-
bol refers to the index in the dictionary, LZW fills this dictionary
with all required alphabet symbols. In the general case, the first
256 index of the dictionary will be filled with ASCII characters
from 0-255. Because the dictionary has been filled with all possi-
ble characters first, the first input character will always be found
in the dictionary. This is why the token in LZW requires only 1
symbol which is a pointer to the dictionary.
3. Results and Discussion
Application of file security by implement DES and LZW algo-
rithm is made by using Embarcadero Delphi XE5 programming
language with windows operating system 10 64 bit, here is the
result of testing perform.
Fig 1. Main Application
Experiment were performed on several document files of different
sizes with non-cryptographic DES testing as well as with the DES
algorithm, figure 2 and 3 are the result experiment.
Table 1. Encryption and Compression Result
No Filename Original (KB) Compress(KB) Ratio
1 Chapter_1.doc 1587 1412 11.03 %
2 MOA.txt 78 17 78.20%
3 License.txt 30 5 83.33%
4 Full_theses.docx 6712 5390 19.69%
5 Order.txt 104 29 72.11%
Fig 2. Experiment Result 1
Fig 3. Experiment Result 2
Figures 2 and 3 are examples of file security testing using DES
algorithm and also compression process using LZW algorithm,
testing is done on 2 different files with different sizes but on the
results obtained different result which in the file of ratio of securi-
ty and compression of 9.46 % while in the text file reached
63.10%, table 1 show few result from encryption and compression.
Table 1 shows the results of encryption and compression of three
doc file types, docx and txt, from testing by DES and LZW algo-
rithm is good for securing data type text not for data or infor-
mation containing images, xml information or type BLOB.
4. Conclusion
The combination of DES and LZW algorithm on file security can
be done well on various file types, but on compression result ob-
tained highest ratio is in text file because do not have image or
XML data as in Microsoft word file, based on this test got result
of combination of DES and LZW whether used transactions or
communication in the form of text.
References
[1] M. Liśkiewicz, R. Reischuk, and U. Wölfel, “Security levels in
steganography – Insecurity does not imply detectability,” Theor.
Comput. Sci., vol. 692, pp. 25–45, 2017.
[2] T. N. Jabeen, M. Chidambaram, and G. Suseendran, “Security and
privacy concerned association rule mining technique for the
accurate frequent pattern identification,” vol. 7, no. 1.1, pp. 19–24,
2018.
International Journal of Engineering & Technology 785
[3] W. Stallings, Network security essentials : applications and
standards. 2011.
[4] A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill
Cipher Using Genetic Algorithm,” Int. J. Secur. Its Appl., vol. 10,
no. 8, pp. 173–180, Aug. 2016.
[5] R. Rahim, “128 Bit Hash of Variable Length in Short Message
Service Security,” Int. J. Secur. Its Appl., vol. 11, no. 1, pp. 45–58,
Jan. 2017.
[6] P. Sethi and V. Kapoor, “A Proposed Novel Architecture for
Information Hiding in Image Steganography by Using Genetic
Algorithm and Cryptography,” in Procedia Computer Science,
2016, vol. 87, pp. 61–66.
[7] A. E. S. Kacaribu and Ratnadewi, “Multiplying cipher images on
visual cryptography with ElGamal algorithm,” in 2015 2nd
International Conference on Information Technology, Computer,
and Electrical Engineering (ICITACEE), 2015, pp. 159–162.
[8] R. I. Al-Khalid, R. A. Al-Dallah, A. M. Al-Anani, R. M. Barham,
and S. I. Hajir, “A Secure Visual Cryptography Scheme Using
Private Key with Invariant Share Sizes,” J. Softw. Eng. Appl., vol.
10, no. 01, pp. 1–10, Jan. 2017.
[9] Ratnadewi, R. P. Adhie, Y. Hutama, A. Saleh Ahmar, and M. I.
Setiawan, “Implementation Cryptography Data Encryption
Standard (DES) and Triple Data Encryption Standard (3DES)
Method in Communication System Based Near Field
Communication (NFC),” J. Phys. Conf. Ser., vol. 954, no. 1, p.
012009, Jan. 2018.
[10] H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream
Cipher using Triple Transposition Key Method and Base64
Algorithm for Security Improvement,” J. Phys. Conf. Ser., vol. 930,
no. 1, p. 012005, Dec. 2017.
[11] D. Abdullah et al., “Super-Encryption Cryptography with IDEA
and WAKE Algorithm,” J. Phys. Conf. Ser., vol. 1019, no. 1, p.
012039, Jun. 2018.
[12] M. Mesran, M. Syahrizal, and R. Rahim, “Enhanced Security for
Data Transaction with Public Key Schnorr Authentication and
Digital Signature Protocol,” ARPN J. Eng. Appl. Sci., vol. 13, no.
11, pp. 3839–3846, 2018.
[13] H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing
steganography with government standard algorithm,” in 2017 3rd
International Conference on Science in Information Technology
(ICSITech), 2017, pp. 366–371.
[14] E. Kartikadarma, T. Listyorini, and R. Rahim, “An Android mobile
RC4 simulation for education,” World Trans. Eng. Technol. Educ.,
vol. 16, no. 1, pp. 75–79, 2018.
[15] R. Rahim, “Man-in-the-middle-attack prevention using interlock
protocol method,” ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp.
6483–6487, 2017.
[16] S. Sriadhi, R. Rahim, and A. S. Ahmar, “RC4 Algorithm
Visualization for Cryptography Education,” J. Phys. Conf. Ser., vol.
1028, no. 1, p. 012057, Jun. 2018.
[17] A. P. U. Siahaan, “Huffman Text Compression Technique.”
[18] D. Salomon, Data Compression The Complete Reference
FourthEdition, vol. 53, no. 9. Springer, 2007.
[19] D. Salomon and G. Motta, HandBook Of Data Compression.
Springer.
[20] R. Rahim, M. Dahria, M. Syahril, and B. Anwar, “Combination of
the Blowfish and Lempel-Ziv-Welch algorithms for text
compression,” World Trans. Eng. Technol. Educ., vol. 15, no. 3, pp.
292–297, 2017.
[21] M. Mesran et al., “Combination Base64 and Hashing Variable
Length for Securing Data,” J. Phys. Conf. Ser., vol. 1028, p.
012056, Jun. 2018.
[22] B. Schneier, “Applied Cryptography: Protocols, Algorithms, and
Source Code in C, Second Edition,” Network. pp. 623–631, 1996.
[23] R. Rahim, D. Adyaraka, S. Sallu, E. Sarimanah, and A. Hidayat,
“An application data security with lempel - ziv welch and blowfish,”
Int. J. Eng. Technol., vol. 7, no. 2.9, pp. 71–73, 2018.
[24] D. Nofriansyah et al., “A New Image Encryption Technique
Combining Hill Cipher Method , Morse Code and Least Significant
Bit Algorithm,” J. Phys. Conf. Ser., vol. 954, no. 1, p. 012003, 2018.
[25] H. Nurdiyanto et al., “Authentication Security in Radio Frequency
Identification with IDEA Algorithm,” IOP Conf. Ser. Mater. Sci.
Eng., vol. 384, p. 012042, Jul. 2018.
[26] F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi
Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen,
Dan File Dokumen Menggunakan Algoritma Advanced Encryption
Standard,” J. Inform. Mulawarman, vol. 10, no. 1, pp. 20–31, 2015.
[27] NIST, “Data Encryption Standard,” Fed. Inf. Process. Stand. Publ.,
1999.
[28] D. Kaur, H. K. Verma, and R. K. Singh, “A hybrid approach of
image steganography,” in Proceeding - IEEE International
Conference on Computing, Communication and Automation,
ICCCA 2016, 2017.
Ad

More Related Content

What's hot (20)

Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
Mahmuda Rahman
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
eSAT Publishing House
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
IJECEIAES
 
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
CSCJournals
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
csandit
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
WilliamY3
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
IJRAT
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
IJCNCJournal
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...
ITIIIndustries
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
IDES Editor
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
IRJAES Editor
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
Mahmuda Rahman
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
eSAT Publishing House
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
IJECEIAES
 
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
CSCJournals
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
csandit
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
WilliamY3
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
IJRAT
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
IJCNCJournal
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...
ITIIIndustries
 
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
Enhanced Level of Security using DNA Computing Technique with Hyperelliptic C...
IDES Editor
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
IRJAES Editor
 

Similar to Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for File Security (20)

Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
IJECEIAES
 
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud DatabaseHybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
ijdmsjournal
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
AM Publications,India
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
IJECEIAES
 
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
 New Research Articles - 2018 November Issue- Advanced Computing: An Internat... New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
acijjournal
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
cscpconf
 
Significant features for steganography techniques using deoxyribonucleic acid...
Significant features for steganography techniques using deoxyribonucleic acid...Significant features for steganography techniques using deoxyribonucleic acid...
Significant features for steganography techniques using deoxyribonucleic acid...
nooriasukmaningtyas
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
IAEME Publication
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
ijcsit
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
AM Publications,India
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
Faith Nweke
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
IJECEIAES
 
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud DatabaseHybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
ijdmsjournal
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
AM Publications,India
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
IJECEIAES
 
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
 New Research Articles - 2018 November Issue- Advanced Computing: An Internat... New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
acijjournal
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
cscpconf
 
Significant features for steganography techniques using deoxyribonucleic acid...
Significant features for steganography techniques using deoxyribonucleic acid...Significant features for steganography techniques using deoxyribonucleic acid...
Significant features for steganography techniques using deoxyribonucleic acid...
nooriasukmaningtyas
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
IAEME Publication
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
ijcsit
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
AM Publications,India
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
Faith Nweke
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
Ad

More from Universitas Pembangunan Panca Budi (20)

An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Universitas Pembangunan Panca Budi
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
Universitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Universitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Universitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
Universitas Pembangunan Panca Budi
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Universitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
Universitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Universitas Pembangunan Panca Budi
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
Universitas Pembangunan Panca Budi
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
Universitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Universitas Pembangunan Panca Budi
 
Examination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp AlgorithmExamination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp Algorithm
Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Universitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Universitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Universitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
Universitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
Universitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Universitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Universitas Pembangunan Panca Budi
 
Ad

Recently uploaded (20)

RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
How to use nRF24L01 module with Arduino
How to use nRF24L01 module with ArduinoHow to use nRF24L01 module with Arduino
How to use nRF24L01 module with Arduino
CircuitDigest
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
Resistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff modelResistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff model
INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
LECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's usesLECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's uses
CLokeshBehera123
 
Artificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptxArtificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptx
DrMarwaElsherif
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
How to use nRF24L01 module with Arduino
How to use nRF24L01 module with ArduinoHow to use nRF24L01 module with Arduino
How to use nRF24L01 module with Arduino
CircuitDigest
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
LECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's usesLECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's uses
CLokeshBehera123
 
Artificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptxArtificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptx
DrMarwaElsherif
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for File Security

  • 1. Copyright © 2018 Robbi Rahim. This is an open access article distributed under the Creative Commons Attribution License, which permits unre- stricted use, distribution, and reproduction in any medium, provided the original work is properly cited. International Journal of Engineering & Technology, 7 (3.2) (2018) 783-785 International Journal of Engineering & Technology Website: www.sciencepubco.com/index.php/IJET Research paper Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for File Security Ida Bagus Ary Indra Iswara1 , I Ketut Sudarsana2 , Nurlaidy Joice Simamora3 , Vivi Novalia Sitinjak3 , Nurhayati Purba3 , Citra Kurniawan4 , Nurul Aziza5 , Dheasy Herawati5 , Dian Rianita6 , Hengki Mangiring Parulian Simarma- ta7 , Elita Modesta Br Sembiring3 , Ari Riswanto8 , Rosida Tiurma Manurung9 , Sofwan Hadi10 , M Mesiono11 , Andys- ah Putera Utama Siahaan12 , Wirda Fitriani12 , Diana Suita13 , Ramadhona Simbolon14 , Robbi Rahim15* 1 STMIK STIKOM Indonesia, Denpasar, Indonesia 2 Institut Hindu Dharma Negeri, Denpasar, Indonesia 3 Universitas Methodist Indonesia, Medan, Indonesia 4 Department of Electrical Engineering, Sekolah Tinggi Teknik Malang, Indonesia. 5 Universitas Maarif Hasyim latif, Sidoarjo, Indonesia 6 Universitas Lancang Kuning, Pekanbaru, Indonesia 7 Politeknik Bisnis Indonesia, Indonesia 8 Economic Education and Management, STKIP PGRI Sukabumi, Indonesia 9 Graduate Program in Scientific Psychology, Universitas Kristen Maranatha, Bandung, Indonesia 10 IAIN Ponorogo, Indonesia 11 Universitas Islam Negeri Sumatera Utara, Medan, Indonesia 12 Universitas Pembangunan Pancabudi, Medan, Indonesia 13 Universitas Harapan Medan, Medan, Indonesia 14 Universitas Islam Sumatera Utara, Medan, Indonesia 15 Sekolah Tinggi Ilmu Manajemen Sukma, Medan, Indonesia *Corresponding author E-mail: [email protected] Abstract The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly Keywords: Security, Data Transmission, Data Encryption Standard, Lempel-Ziv-Welch 1. Introduction Security and confidentiality issues are an important aspect of data, messages and information[1]–[5]. Delivery of a message, data and information of great importance requires a high level of security. With the development of today information is so fast where eve- ryone will be easy to get a message, data and information, it make various ways people do to get the data and information[6]–[11]. Starting from the easy level to the more complicated ways, and many people also try to protect the message so that it cannot be known by people who do not have rights to the message or data[12]–[16]. Addition to the process of securing the data or information also needs to be done the process of measuring the size of a data (Compression)[17], [18]. The purpose of this compression is to speed up the transmission of data or information[19]. Data com- pression also aims to reduce the size of data and can be stored on storage media that has a relatively small size. Security and speed are important in communication using computers and computer networks[20], [21]. Data Encryption Standard (DES) algorithm are one of the most widely used encryption algorithm in the world[9], [22]. In general, the data encryption standard is divided into three groups, namely key processing, 64 bit encryption and 64 bit data description in which each group will interact with each other. Because DES algorithm has been widely used then here the authors will do a merger of the DES algorithm and LZW algorithm[20], [23], so that the level of security obtained higher and expected data or information cannot be read easily by irresponsible parties. 2. Methodology A. Cryptography Cryptography has an important role in the world of computers. This is caused because the number of confidential information that is stored and sent through computer media[24], [25]. This infor- mation usually contains document documents important financial
  • 2. 784 International Journal of Engineering & Technology data from an agency that do not want to be read by unauthorized person on the information. In general, Cryptography is an information security technique that is done by processing plaintext by using a certain encryption algo- rithm and producing ciphertext that cannot be read directly. Cryptography has a very long and amazing history. Most of the history of Cryptography is part of classical cryptography, which is a cryptographic method that uses paper and pencil or uses simple mechanical aids to date that already use mathematical calculations like the DES (Data Encryption Standard) algorithm. DES is a block cipher algorithm that belongs to a cryptographic system of symmetry[26]. DES operates on a 64 bit block size. DES encrypts 64 bits of plaintext into 64 bit ciphertext using 56 bits of internal keys. The internal keys on the DES Algorithm are generated from external keys that are 64 bits long[27]. B. Compression Data compression is the science or art of representing information in a more compact form. The purpose of data compression is to represent a digital data with as few bits as possible, but retain the minimum requirement to reshape the original data (decompres- sion)[28]. The Lempel-Ziv-Welch (LZW) algorithm, developed by Abraham Lempel, Jacob Ziv, and Terry Welch. This algorithm reduces the number of tokens required to 1 symbol only[23], [28]. This sym- bol refers to the index in the dictionary, LZW fills this dictionary with all required alphabet symbols. In the general case, the first 256 index of the dictionary will be filled with ASCII characters from 0-255. Because the dictionary has been filled with all possi- ble characters first, the first input character will always be found in the dictionary. This is why the token in LZW requires only 1 symbol which is a pointer to the dictionary. 3. Results and Discussion Application of file security by implement DES and LZW algo- rithm is made by using Embarcadero Delphi XE5 programming language with windows operating system 10 64 bit, here is the result of testing perform. Fig 1. Main Application Experiment were performed on several document files of different sizes with non-cryptographic DES testing as well as with the DES algorithm, figure 2 and 3 are the result experiment. Table 1. Encryption and Compression Result No Filename Original (KB) Compress(KB) Ratio 1 Chapter_1.doc 1587 1412 11.03 % 2 MOA.txt 78 17 78.20% 3 License.txt 30 5 83.33% 4 Full_theses.docx 6712 5390 19.69% 5 Order.txt 104 29 72.11% Fig 2. Experiment Result 1 Fig 3. Experiment Result 2 Figures 2 and 3 are examples of file security testing using DES algorithm and also compression process using LZW algorithm, testing is done on 2 different files with different sizes but on the results obtained different result which in the file of ratio of securi- ty and compression of 9.46 % while in the text file reached 63.10%, table 1 show few result from encryption and compression. Table 1 shows the results of encryption and compression of three doc file types, docx and txt, from testing by DES and LZW algo- rithm is good for securing data type text not for data or infor- mation containing images, xml information or type BLOB. 4. Conclusion The combination of DES and LZW algorithm on file security can be done well on various file types, but on compression result ob- tained highest ratio is in text file because do not have image or XML data as in Microsoft word file, based on this test got result of combination of DES and LZW whether used transactions or communication in the form of text. References [1] M. Liśkiewicz, R. Reischuk, and U. Wölfel, “Security levels in steganography – Insecurity does not imply detectability,” Theor. Comput. Sci., vol. 692, pp. 25–45, 2017. [2] T. N. Jabeen, M. Chidambaram, and G. Suseendran, “Security and privacy concerned association rule mining technique for the accurate frequent pattern identification,” vol. 7, no. 1.1, pp. 19–24, 2018.
  • 3. International Journal of Engineering & Technology 785 [3] W. Stallings, Network security essentials : applications and standards. 2011. [4] A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,” Int. J. Secur. Its Appl., vol. 10, no. 8, pp. 173–180, Aug. 2016. [5] R. Rahim, “128 Bit Hash of Variable Length in Short Message Service Security,” Int. J. Secur. Its Appl., vol. 11, no. 1, pp. 45–58, Jan. 2017. [6] P. Sethi and V. Kapoor, “A Proposed Novel Architecture for Information Hiding in Image Steganography by Using Genetic Algorithm and Cryptography,” in Procedia Computer Science, 2016, vol. 87, pp. 61–66. [7] A. E. S. Kacaribu and Ratnadewi, “Multiplying cipher images on visual cryptography with ElGamal algorithm,” in 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), 2015, pp. 159–162. [8] R. I. Al-Khalid, R. A. Al-Dallah, A. M. Al-Anani, R. M. Barham, and S. I. Hajir, “A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes,” J. Softw. Eng. Appl., vol. 10, no. 01, pp. 1–10, Jan. 2017. [9] Ratnadewi, R. P. Adhie, Y. Hutama, A. Saleh Ahmar, and M. I. Setiawan, “Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC),” J. Phys. Conf. Ser., vol. 954, no. 1, p. 012009, Jan. 2018. [10] H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement,” J. Phys. Conf. Ser., vol. 930, no. 1, p. 012005, Dec. 2017. [11] D. Abdullah et al., “Super-Encryption Cryptography with IDEA and WAKE Algorithm,” J. Phys. Conf. Ser., vol. 1019, no. 1, p. 012039, Jun. 2018. [12] M. Mesran, M. Syahrizal, and R. Rahim, “Enhanced Security for Data Transaction with Public Key Schnorr Authentication and Digital Signature Protocol,” ARPN J. Eng. Appl. Sci., vol. 13, no. 11, pp. 3839–3846, 2018. [13] H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing steganography with government standard algorithm,” in 2017 3rd International Conference on Science in Information Technology (ICSITech), 2017, pp. 366–371. [14] E. Kartikadarma, T. Listyorini, and R. Rahim, “An Android mobile RC4 simulation for education,” World Trans. Eng. Technol. Educ., vol. 16, no. 1, pp. 75–79, 2018. [15] R. Rahim, “Man-in-the-middle-attack prevention using interlock protocol method,” ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp. 6483–6487, 2017. [16] S. Sriadhi, R. Rahim, and A. S. Ahmar, “RC4 Algorithm Visualization for Cryptography Education,” J. Phys. Conf. Ser., vol. 1028, no. 1, p. 012057, Jun. 2018. [17] A. P. U. Siahaan, “Huffman Text Compression Technique.” [18] D. Salomon, Data Compression The Complete Reference FourthEdition, vol. 53, no. 9. Springer, 2007. [19] D. Salomon and G. Motta, HandBook Of Data Compression. Springer. [20] R. Rahim, M. Dahria, M. Syahril, and B. Anwar, “Combination of the Blowfish and Lempel-Ziv-Welch algorithms for text compression,” World Trans. Eng. Technol. Educ., vol. 15, no. 3, pp. 292–297, 2017. [21] M. Mesran et al., “Combination Base64 and Hashing Variable Length for Securing Data,” J. Phys. Conf. Ser., vol. 1028, p. 012056, Jun. 2018. [22] B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition,” Network. pp. 623–631, 1996. [23] R. Rahim, D. Adyaraka, S. Sallu, E. Sarimanah, and A. Hidayat, “An application data security with lempel - ziv welch and blowfish,” Int. J. Eng. Technol., vol. 7, no. 2.9, pp. 71–73, 2018. [24] D. Nofriansyah et al., “A New Image Encryption Technique Combining Hill Cipher Method , Morse Code and Least Significant Bit Algorithm,” J. Phys. Conf. Ser., vol. 954, no. 1, p. 012003, 2018. [25] H. Nurdiyanto et al., “Authentication Security in Radio Frequency Identification with IDEA Algorithm,” IOP Conf. Ser. Mater. Sci. Eng., vol. 384, p. 012042, Jul. 2018. [26] F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” J. Inform. Mulawarman, vol. 10, no. 1, pp. 20–31, 2015. [27] NIST, “Data Encryption Standard,” Fed. Inf. Process. Stand. Publ., 1999. [28] D. Kaur, H. K. Verma, and R. K. Singh, “A hybrid approach of image steganography,” in Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016, 2017.