Encryption of Audio File Using AES and Blowfish Algorithms

Main Article Content

Novario Jaya Perdana
Bagus Mulyawan
Vico Lukianto

Abstract

Cloud storage has a role to boldly store data so that it can be accessed by various users. The amount of data stored, causes this data to be vulnerable to attack. It takes a method that can guarantee the security of the data. AES has become a trusted encryption method because of its computational power. Blowfish as a newer method is also trusted because it is efficient and effective in storing data. A web-based application was successfully created based on this method. This app is used to test the combination of these 2 methods. The data used in this study is audio data. Audio data has a higher level of complexity than text data in general, so it requires additional processing when encrypted. Based on the test results, it was found that, the results of the data survived against security attacks with the plain text analysis method with a decryption rate of 0.049%. In addition, the method also succeeded in encrypting data at an average speed of 14 seconds, and decrypting data at an average speed of 13 seconds.

Article Details

Section
Articles

References

Katella, K. (2021). Our pandemic year—A COVID-19 timeline. Yale Medicine, 9.

WHO, B. (2020). Listings of WHO’s response to COVID-19. World Health Organization.

Pandey, A. K., Mishra, S. S., Wadgave, Y., Mudgil, N., Gawande, S., & Dhange, V. B. (2021). The COVID-19 variants: an overview. International Journal of Community Medicine and Public Health, 8(10), 5148.

Simanjuntak, T. R. (2021). Sejarah hari ini: 2 maret 2020, warga depok terkonfirmasi sebagai pasien pertama covid-19. Kompas. Com, 3(6).

COVID, S. D. M. P., & PERMAS, A. D. TINJAUAN KEBIJAKAN RELAKSASI PEMBIAYAAN PADA BANK JATENG KCPS.

Hastuti, P., Harefa, D. N., & Napitupulu, J. I. M. (2020). Tinjauan kebijakan pemberlakuan lockdown, phk, psbb sebagai antisipasi penyebaran covid-19 terhadap stabilitas sistem moneter. Prosiding WEBINAR Fakultas Ekonomi Unimed “Strategi Dunia Usaha Menyikapi Status Indonesia Sebagai Negara Maju: Pra dan Pasca Covid-19”, 57-70.

Hastuti, P., Harefa, D. N., & Napitupulu, J. I. M. (2020). Tinjauan kebijakan pemberlakuan lockdown, phk, psbb sebagai antisipasi penyebaran covid-19 terhadap stabilitas sistem moneter. Prosiding WEBINAR Fakultas Ekonomi Unimed “Strategi Dunia Usaha Menyikapi Status Indonesia Sebagai Negara Maju: Pra dan Pasca Covid-19”, 57-70.

Tanamal, G. (2022). Hubungan antara Kesepian dengan Kecenderungan Nomophobia pada Mahasiswa Universitas Kristen Satya Wacana (Doctoral dissertation).

Kushwaha, K. S. (2020). IOT BASED HEALTH CARE SYSTEM PANDEMIC (COVID-19) ASPERENT USING CLOUD COMPUTING.

He, J., Zheng, D., Guo, R., Chen, Y., Li, K., & Tao, X. (2021). Efficient identity-based proxy re-encryption scheme in blockchain-assisted decentralized storage system. International Journal of Network Security, 23(5), 776-790.

Ngabo, D., Wang, D., Iwendi, C., Anajemba, J. H., Ajao, L. A., & Biamba, C. (2021). Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things. Electronics, 10(17), 2110.

Rakhmat, E., Dwiyatno, S., Sulistiyon, S., Irawan, A., & Setiawan, F. (2021). Pemanfaatan Aplikasi Owncloud Pada Sistem Keamanan Cloud Computing. Jurnal Sistem Informasi Dan Informatika (Simika), 4(2), 146-155.

Wang, S., Wang, X., & Zhang, Y. (2019). A secure cloud storage framework with access control based on blockchain. IEEE access, 7, 112713-112725.

Sanda, M. U., Dawud, J. A., Ibrahim, U., & Bukar, Y. (2022). Insecticide Production from Orange Peel Oil. International Journal of Pure & Applied Science Research.

Chen, R., Mu, Y., Yang, G., Guo, F., & Wang, X. (2015). Dual-server public-key encryption with keyword search for secure cloud storage. IEEE transactions on information forensics and security, 11(4), 789-798.

Tajammul, M., & Parveen, R. (2019). Key generation algorithm coupled with DES for securing cloud storage. International Journal of Recent Technology in Engineering.

Mahardhika, M. A., Purwanto, Y., & Ruriawan, M. F. (2021). Pengamanan Data Cloud Storage Dengan Menggunakan Advanced Encryption Standard Dan Elliptic Curve Digital Signature Algorithm Pada Secure Socket Layer Berbasis Website. eProceedings of Engineering, 8(2).

Coronado, A. S. (2013). Computer security: Principles and practice.

Johnson, S. (2007). Cryptography for Developers. Syngress Publishing.

Schneier, B. (1994). The Blowfish encryption algorithm. Dr Dobb's Journal-Software Tools for the Professional Programmer, 19(4), 38-43.

Kabal, P. (2017). Audio file format specifications. MMSP Lab, ECE, McGill University.