Perbandingan Algoritma SIMON dan SPECK Dalam Pengamanan Citra Digital

  • Yulia Fatma Universitas Muhammadiyah Riau
  • Soni Universitas Muhammadiyah Riau
  • Mikdad Amseno Universitas Muhammadiyah Riau
Keywords: cryptography, simon, speck, UACI, NPCR

Abstract

Cryptography is a data security technique by encoding data that is to be kept secret so that the original meaning of the data can no longer be understood. SIMON and SPECK are modern cryptographic algorithms issued by the National Security Agency (NSA). SIMON and SPECK are said to be algorithms that are known for their efficiency and strong security. This research will compare the performance of the SIMON and SPECK algorithms in securing digital images. Comparisons were made by testing time performance, changes in file size, and the level of randomness of image files using the Unified Average Changing Intensity (UACI) and Number of Pixels Change Rate (NPCR) metrics. The research results show that the average encryption and decryption time required by the SIMON algorithm is greater when compared to the SPECK algorithm. The image file size resulting from encryption using the SIMON and SPECK algorithms both increased by 24% from the original image. The level of randomness of the resulting image based on the UACI value obtained using the SIMON algorithm was found to be an average of 19.65%, while the UACI value obtained using the SPECK algorithm was an average of 20.94%. This shows that there is a significant change in intensity between the original image and the encrypted image. However, not all pixels in the encrypted image change when compared to the original image, this is shown by the NPCR value obtained from the SIMON and SPECK algorithm encrypted image, with average results of 49.98% and 50.17%.

Downloads

Download data is not yet available.

References

[1] Beaulieu, Ray et al. 2015. “The SIMON and SPECK Lightweight Block CIPhers.” Proceedings - Design Automation Conference 2015-July.
[2] Bouzida, Y., & Rachdi, F. 2016. “Implementing the SIMON and SPECK Lightweight Block Ciphers on Smart Cards.” Journal of Information Security and Applications: 28–40.
[3] Chen, G., Mao, Y., & Chui, C. K. 2004. “A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps.” Chaos, Solitons & Fractals: 749–61.
[4] Fitriana, G F, L N Hidayati, and ... 2021. “Perbandingan Keacakan Citra Enkripsi Algoritma AES Dan Camelia Uji NPCR Dan UACI.” JURIKOM (Jurnal Riset … 8(6): 274–83.
[5] Ghosh, S., & Roy, A. 2018. “Lightweight Cryptography for IoT Security: Implementation of Simon and Speck on Contiki-NG OS.” IEEE Access: 49401–12.
[6] Ginata, S, A Kusyanti, and R Primananda. 2019. “Implementasi Algoritme Kriptografi Simon Pada Arsitektur Amazon Web Services.” … Teknologi Informasi dan Ilmu … 3(8): 7888–97.
[7] Khatiwada, D., Walia, G. S., & Kavi, K. M. 2018. “On Placement of Hypervisors and Controllers in Virtualized Software Defined Network.” IEEE Transactions on Sustainable Computing: 233–44.
[8] Riski, Abduh, Ahmad Kamsyakawuni, and M. Ziaul Arif. 2018. “Implementasi Vigenere Cipher Pada Pendahuluan Citra Digital.” 02(01): 23–30.
[9] Sulistyowati, Karmila Dewi, Ari Kusyanti, and Mahendra Data. 2019. “Analisis Kinerja Algoritme Speck Pada Keamanan File Teks.” 3(4): 3719–27.
[10] Wang, X., & Liu, L. 2013. “A Novel Chaotic Block Image Encryption Algorithm Based on Dynamic Random Growth Technique.” Optics and Lasers in Engineering: 121–28.
[11] Zhu, C., Wang, G., & Sun, K. 2011. “Cryptanalysis and Improvement of a Chaos-Based Image Encryption Scheme.” Chaos, Solitons & Fractals: 2191–99.
Published
2024-08-06
How to Cite
Fatma, Y., Soni, & Mikdad Amseno. (2024). Perbandingan Algoritma SIMON dan SPECK Dalam Pengamanan Citra Digital. Jurnal CoSciTech (Computer Science and Information Technology), 5(2), 250-259. https://doi.org/10.37859/coscitech.v5i2.7619
Abstract views: 86 , PDF downloads: 78