Message Authentication Scheme on Light Weight Parallel Encryption Model With Digit Artithmetic of Covertext using Secure Hash Algorithm
Downloads
This research aims to enhance message security by developing a Light Weight Parallel Digit Arithmetic of Covertext (PDAC) encryption-based authentication scheme that adopts the Secure Hash Algorithm (SHA) algorithm to ensure message integrity and authentication aspects. Through experiments, tests are conducted on two main aspects: entropy and collision resistance. The experimental results show that the average entropy generated reaches 4.992, or 62.41% of the optimal entropy value. While this result shows a good randomness, there is room for further improvement to reach the optimal level. Collision resistance testing using Google's SHAttered tool showed very positive results. No collisions were found in any of the samples tested, indicating that the PDAC scheme combined with SHA can maintain message integrity well. This indicates that PDAC has strong resistance to hash-based attacks, ensuring that messages remain authentic and safe from manipulation. Thus, this study concludes that PDAC schemes offer a good balance between efficiency, security, and low power consumption, making it suitable for use in resource-constrained environments such as IoT devices and mobile applications
M. S. Gayathri and V. Preethi, “Study: Cryptography for information security,” 2024, p. 020025. doi: 10.1063/5.0190639.
P. Kulkarni and C. Kothari, “Documentation and Data Integrity in Pharmaceutical Industry,” in Modern Aspects of Pharmaceutical Quality Assurance, Singapore: Springer Nature Singapore, 2024, pp. 381–403. doi: 10.1007/978-981-99-9271-3_11.
S. Pothireddy, N. Peddisetty, P. Yellamma, G. Botta, and K. N. Gottipati, “Data Security in Cloud Environment by Using Hybrid Encryption Technique: A Comprehensive Study on Enhancing Confidentiality and Reliability,” International Journal of Intelligent Engineering and Systems, vol. 17, no. 2, pp. 159–170, Apr. 2024, doi: 10.22266/ijies2024.0430.14.
O. M. C. Osazuwa, “Confidentiality, Integrity, and Availability in Network Systems: A Review of Related Literature,” Int J Innov Sci Res Technol, vol. 8, no. 12, pp. 1946–1955, 2023.
Akoh Atadoga, Oluwatoyin Ajoke Farayola, Benjamin Samson Ayinla, Olukunle Oladipupo Amoo, Temitayo Oluwaseun Abrahams, and Femi Osasona, “A COMPARATIVE REVIEW OF DATA ENCRYPTION METHODS IN THE USA AND EUROPE,” Computer Science & IT Research Journal, vol. 5, no. 2, pp. 447–460, Feb. 2024, doi: 10.51594/csitrj.v5i2.815.
R. Sahbi, S. Ghanemi, and M. A. Ferrag, “Security of internet of vehicles in smart cities: authentication and confidentiality aspects,” International Journal of Internet Technology and Secured Transactions, vol. 13, no. 3, pp. 232–269, 2024, doi: 10.1504/IJITST.2024.136655.
N. S. Mohammed, O. A. Dawood, A. M. Sagheer, and A. A. Nafea, “Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon,” Baghdad Science Journal, May 2023, doi: 10.21123/bsj.2023.8164.
A. Hadabi et al., “Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT,” Computers and Electrical Engineering, vol. 116, p. 109164, May 2024, doi: 10.1016/j.compeleceng.2024.109164.
E. Ardhianto, W. T. Handoko, and E. Lestariningsih, “New Mechanism of Parallel Encryption with Digit Arithmetic of Cover Text Encryption Model with Reduced Ciphertext Size,” ICIC Express Letters, vol. 18, no. 1, pp. 9–15, 2024.
W. T. Handoko, E. Ardhianto, H. Murti, and R. S. Redjeki, “A LIGHT WEIGHT OF PARALLEL ENCRYPTION WITH DIGIT ARITHMETIC OF COVERTEXT ENCRYPTION MODEL,” J Theor Appl Inf Technol, vol. 101, no. 24, pp. 8028–8037, 2023.
R. Chemlal, “A note on combining chaotic dynamical systems using the fuzzy logic XOR operator,” Dec. 2020.
Y. He, G. Xia, and C. He, “A File cloud sharing method based on XOR operation,” IOP Conf Ser Mater Sci Eng, vol. 768, no. 7, p. 072085, Mar. 2020, doi: 10.1088/1757-899X/768/7/072085.
C. Singh and E. Baburaj, “XOR Reformed Paillier Encryption Method with Secure De-duplication for Image Scaling and Cropping in Reduced Cloud Storage,” International Journal of Intelligent Engineering and Systems, vol. 12, no. 4, pp. 328–337, Aug. 2019, doi: 10.22266/ijies2019.0831.30.
S. Kataria, B. Singh, T. Kumar, and H. S. Shekhawat, “PDAC (Parallel Encryption with Digit Arithmetic of Cover Text) Based Text Steganography,” in Int. Conf. on Advances in Computer Science, AETACS, 2013, pp. 175–182.
M. Gaur and M. Sharma, “A New PDAC (Parallel Encryption with Digit Arithmetic of Cover Text) Based Text Steganography Approach for Cloud Data Security,” International Journal on Recent and Innovation Trends in Computing and Communication , vol. 3, no. 3, pp. 1344–1352, 2015, [Online]. Available: http://www.ijritcc.org
W. T. Handoko, E. Ardhianto, and E. Supriyanto, “MODIFIKASI NEW PDAC (PARALLEL ENCRYPTION WITH DIGIT ARITHMETIC OF COVER TEXT),” in SENDIU 2020, 2020, pp. 55–59.
E. Ardhianto, K. M. A. Pamungkas, E. Supriyanto, and E. Lestariningsih, “MODIFIKASI PARALLEL ENCRYPTION WITH DIGIT ARITHMETIC AND COVERTEXT (PDAC) MENGGUNAKAN KUNCI BERULANG,” Jurnal Informatika Universitas Pamulang, vol. 7, no. 2, pp. 308–312, 2022.
H. Murti, E. Supriyanto, R. Redjeki, and E. Ardhianto, “ADOPSI REPETITIF COVERTEXT PADA MEODEL ENKRIPSI PDAC,” Jurnal Informatika Polinema, vol. 9, no. 1, pp. 1–8, Nov. 2022, doi: 10.33795/jip.v9i1.1152.
E. Ardhianto, Y. Heryadi, L. A. Wülandhari, and W. Budiharto, “Covertext Generation using Fuzzy Logic Approach in Parallel Encryption with Digit Arithmetic of Covertext to Improve Information Confidentiality,” International Journal of Innovative Computing, Information and Control, vol. 19, no. 4, pp. 1311–1321, Aug. 2023, doi: 10.24507/ijicic.19.04.1311.
E. Ardhianto, Y. Heryadi, L. A. Wulandhari, and W. Budiharto, “PARALLEL ENCRYPTION WITH DIGIT ARITHMETIC OF COVERTEXT ENCRYPTION MODEL USING COVERTEXT GENERATOR WITH FUZZY LOGIC APPROACH,” ICIC Express Letters ICIC International, vol. 17, no. 7, pp. 817–824, 2023, doi: 10.24507/icicel.17.07.817.
F. Buccafurri, V. De Angelis, and S. Lazzaro, “MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT,” IEEE Trans Dependable Secure Comput, pp. 1–18, 2024, doi: 10.1109/TDSC.2024.3358630.
M. Tanveer, A. Aldosary, S. Khokhar, A. K. Das, S. A. Aldossari, and S. A. Chaudhry, “PAF-IoD: PUF-Enabled Authentication Framework for the Internet of Drones,” IEEE Trans Veh Technol, pp. 1–15, 2024, doi: 10.1109/TVT.2024.3365992.
Nasution, R. M., “Implementasi Metode Secure Hash Algorithm (SHA-1) Untuk Mendeteksi Orisinalitas File Audio”, BULLETIN OF COMPUTER SCIENCE RESEARCH, vol 2, no 3, pp. 73-84, 2022, doi: 10.47065/bulletincsr.v2i3.140.
Al-Layla, H. F., Ibraheem F.N., and Hasan, H. A., “A Review of Hash Function Types and their Applications”, Wasit Journal of Computer and Mathematics Science, vol. 1, no. 3, pp. 75-88, 2022, doi: 10.31185/wjcm.52.
Anwar M.R., Apriani, D., and Adianita, I.R., “Hash Algorithm in Verification of Certificate Data Integrity And Security”, Aptisi Transactions on Technopreneurship (ATT), vol. 3, no. 2. pp. 181-188, 2022, doi: 10.34306/att.v3i2.212.
Farawn, A.A., Rjeib, H.D., Ali, N.S., and Al-Sadawi, B., “Secured e-payment system based on automated authentication data and iterated salted hash algorithm”, TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 18, no. 1, pp. 538-544, 2020, doi: 10.12928/TELKOMNIKA.v18i1.15623.
E. Ardhianto, W. Budiharto, Y. Heryadi, and L. A. Wulandhari, “A Comparative Experiment of Document Security Level on Parallel Encryption with Digit Arithmetic of Covertext and Parallel Encryption using Covertext,” in 19th IEEE Student Conference on Research and Development: Sustainable Engineering and Technology towards Industry Revolution, SCOReD 2021, 2021. doi: 10.1109/SCOReD53546.2021.9652746.
A. Gutub and B. O. Al-Roithy, “Varying PRNG to improve image cryptography implementation,” Journal of Engineering Research (Kuwait), vol. 9, no. 3, pp. 153–183, Sep. 2021, doi: 10.36909/jer.v9i3A.10111.