Annisa, Siti Azzalea (2024) Penerapan Skema PRactical Efficient Secret Sharing untuk Pengamanan Data pada Citra dan Teks. Other thesis, Institut Teknologi Sepuluh Nopember.
Text
5002201045-Undergraduate_Thesis.pdf - Accepted Version Restricted to Repository staff only until 1 October 2026. Download (4MB) | Request a copy |
Abstract
Pesatnya perkembangan komputer dan internet telah memudahkan berbagai layanan seperti belanja online dan e-government. Pengguna layanan ini sering kali harus memasukkan data pribadi dan sensitif, yang berisiko disalahgunakan jika tidak
diamankan dengan baik. Salah satu cara untuk melindungi kerahasiaan data adalah dengan menggunakan kriptografi. Salah satu teknik kriptografi untuk melindungi kerahasiaan data adalah enkripsi. Akan tetapi, enkripsi memiliki risiko seperti kebocoran kunci dan serangan kriptanalisis. Selain enkripsi, terdapat pendekatan lain untuk melindungi erahasiaan data yaitu, secret sharing. Secret sharing adalah suatu teknik untuk memecah rahasia ke beberapa orang atau entitas, masing-masing pemegang pecahan rahasia tidak mengetahui informasi apapun mengenai rahasia asli. Kecuali, jika sejumlah pecahan dengan ambang batas tertentu dikumpulkan maka dengan sebuah cara tertentu rahasia ini bisa irekonstruksi kembali. Dengan secret sharing risiko enkripsi seperti kebocoran kunci dan kerusakan algoritma dapat dihindari. Penelitian Tugas Akhir ini berfokus pada skema secret sharing yang bernama (PRactical Efficient Secret Sharing) disingkat menjadi PRESS. Dengan menggunakan bahasa
pemrograman Java penerapan skema PRESS dimulai dengan membangun terlebih dahulu fungsi untuk memecah data rahasia menjadi pecahan yang biasa disebut share, selanjutnya dibangun fungsi merekonstruksi rahasia menggunakan share yang minimal sejumlah ambang batas yang ditentukan. Untuk menguji kinerja skema yang diterapkan digunakan data teks dan citra. Pengujian meliputi waktu dan ruang memori. Dari pengujian didapat kesimpulan bahwa semakin banyak jumlah pecahan yang ditetapkan dapat memengaruhi kinerja dari skema PRESS baik dari segi waktu menjadi lebih cepat dan ruang memori yang digunakan menjadi lebih sedikit.
=============================================================
=============================================================
The rapid development of computers and the internet has facilitated various services such as online shopping and e-government. Users of these services often have to enter personal and sensitive data, which is at risk of misuse if not properly secured. One way to protect the confidentiality of data is through cryptography. One cryptographic technique to protect data confidentiality is encryption. However, encryption has risks such as key leakage and cryptanalysis attacks. Besides encryption, there is another approach to protecting data confidentiality, which is secret sharing. Secret sharing is a technique for dividing a secret among several people or entities, where each holder of a secret share does not know any information about the original secret. However, if a certain threshold number of shares is collected, the secret can be reconstructed in a specific way. Due to its different technique from encryption, the risks of encryption such as key leakage and algorithm failure can be avoided. This Final Project research focuses on a secret sharing scheme called PRactical Efficient Secret Sharing, abbreviated as PRESS. Using the Java programming language, the implementation of the PRESS scheme begins by first building functions to split secret data into parts commonly called shares, followed by building functions to reconstruct the secret using a minimum number of shares as determined by the threshold. To test the performance of the implemented scheme, text and image data are used. The testing includes time and memory space. Based on the testing, it is concluded that the greater the number of secret shard set, the better the performance of the PRESS scheme both in terms of time, which becomes faster, and memory usage, which becomes lower.
Item Type: | Thesis (Other) |
---|---|
Uncontrolled Keywords: | secret sharing, pengamanan data, kerahasiaan, kriptografi, threshold, secret sharing, data security, confidentiality, cryptography, threshold. |
Subjects: | Q Science > QA Mathematics Q Science > QA Mathematics > QA184 Algebra, Linear Q Science > QA Mathematics > QA76.758 Software engineering Q Science > QA Mathematics > QA76.9.A25 Computer security. Digital forensic. Data encryption (Computer science) |
Divisions: | Faculty of Science and Data Analytics (SCIENTICS) > Mathematics > 44201-(S1) Undergraduate Thesis |
Depositing User: | Siti Azzalea Annisa |
Date Deposited: | 06 Aug 2024 07:51 |
Last Modified: | 06 Aug 2024 07:51 |
URI: | http://repository.its.ac.id/id/eprint/111238 |
Actions (login required)
View Item |