Application of Gost Algorithm For The Safety of Data Sending of General Election

Novan Wijaya

Abstract


Abstract : The rapid development of the internet has an impact on the security of data sent using internet media. One government agency that uses the internet as data transmission includes the KPU. Data transmission becomes very risky especially the data sent is very important and even confidential. In the internet world, there are many threats and ways to change or retrieve data sent via the internet. Indonesia in particular has conducted direct elections but the data that are in the regions which are the results of recapitulation of the elections will be sent via the internet with a system provided by the KPU. Data from the recapitulation of regional elections becomes very important because it can be changed by intruders. Secure the data sent, methods such as cryptographic techniques that can minimize interference from intruders are needed. One algorithm that can be applied as data security is the GOST algorithm. The GOST algorithm is designed to take a balance between data efficiency and security. Cryptographic techniques that use the GOST algorithm are expected to be able to increase the security of sending election results from various threats without reducing the performance of sending data. The rapid development of the internet has the impact of the security of data sent using internet media. One government agency that uses the internet as data transmission includes the KPU. Data transmission becomes very risky especially the data sent is very important and even confidential. In the internet world, there are many threats and ways to change or retrieve data sent through internet media. Indonesia in particular has conducted direct elections but the data that are in the regions which are the results of recapitulation of the elections will be sent via the internet with a system provided by the KPU. Data from the recapitulation of regional elections becomes very important because it can be changed by intruders. Secure the data sent, methods such as cryptographic techniques that can minimize interference from intruders are needed. One algorithm that can be applied as data security is the GOST algorithm. The GOST algorithm is designed to take a balance between data efficiency and security. Cryptographic techniques that use GOST algorithm can improve the security of sending election results from various threats without reducing the performance of sending data. Election result data that was conducted during the testing was the Ogan Ilir regional election recap data. Tests that have been carried out using the GOST algorithm using WireShark produce stream files sent over the network are not easily identified because they are converted into random strings, so it takes a long time to analyze them.

Abstrak : Perkembangan internet yang sangat cepat mempunyai dampak diantranya keamanan data yang dikirim menggunakan media internet. Salah satu instansi pemerintahan yang menggunakan internet sebagai pengiriman data diantaranya KPU. Pengiriman data menjadi sangat beresiko terlebih data yang dikirimkan sangat penting bahkan bersifat rahasia. Didunia internet terdapat banyak ancaman serta cara dalam mengubah atau mengambil data yang dikirimkan melalui media internet. Indonesia pada khususnya telah melakukan pemilu secara langsung tetapi data-data yang berada pada daerah yang merupakan hasil rekapitulasi dari pemilu akan dikirimkan melalui internet dengan sistem yang telah disediakan oleh KPU. Data hasil rekapitulasi pemilu suatu daerah menjadi sangat penting dikarenakan bisa diubah oleh intruder. Untuk mengamankan data yang dikirimkan diperlukan metode seperti teknik kriptografi yang bisa meminimalisir gangguan dari para intruder. Salah satu algoritma yang bisa diterapkan sebagai keamanan data yaitu algoritma GOST. Algoritma GOST dirancang agar mengambil keseimbangan antara efisiensi dan keamanan data. Teknik kriptografi yang menggunakan algoritma GOST mampu meningkatkan keamanan pengiriman data hasil pemilu dari berbagai ancaman tanpa mengurangi performansi dari pengiriman data. Data hasil pemilu yang dilakukan saat pengujian ialah data rekap pilkada Ogan Ilir. Pengujian yang telah dilakukan menggunakan algoritma GOST menggunakan wireshark menghasilkan stream file yang dikirim melalui jaringan tidak mudah diidentifikasi dikarenakan diubah menjadi string acak sehingga membutuhkan waktu yang lama untuk menganalisanya.


Keywords


Cryptography; GOST Algorithm; Intruder; Election; Wireshark

Full Text:

PDF

References


Anas, I., Nanda, P. A., & Hidayat, A. (2019). Implementasi Algoritma Vigeneere Cipher dan GOST dalam Keamanan Data. SinkrOn, 2(2), 18–22.

Arrijal, I. M., Efendi, R., & Susilo, B. (2016). Vigenere Cipher Dalam Aplikasi. Pseudocode, III(1), 69–82. https://doi.org/https://doi.org/10.33369/ pseudocode.3.1.69-82

Benedict, M., Budiman, M. A., & Rachmawati, D. (2017). Perbandingan Algoritma Message Digest-5 ( MD5 ) dan Gosudarstvennyi Standard ( GOST ) pada Hashing File Dokumen. Jurnal Teknik Informatika Kaputama (JTIK), 1(1), 50–61.

Hendrawan, A. H. (2016). Analisis Serangan Flooding Data Pada Router Mikrotik. Krea-TIF, 4(1), 12–20. https://doi.org/http://dx.doi.org/10.32832/ kreatif.v4i1.894

Muharyanto, A. S., & Fatimah, T. (2018). Keamanan Database Dengan Metode Rivest Code 4 (RC4) dan Caesar Cipher Berbasis Desktop. SKANIKA, 1(2), 508–513.

Mukhtar, H. (2018). Kriptografi Untuk Keamanan Data (Ed.1). Yogyakarta: Deepublish.

Munir, R. (2019). Kriptografi Edisi Kedua. Bandung: Informatika.

Mustaqbal, M. Si., Firdaus, R. F., & Rahmadi, H. (2015). Pengujian Aplikasi Menggunakan Black Box Testing Boundary Value Analysis. Jurnal Ilmiah Teknologi Informasi Terapan (JITTER), 1(3), 31–36.

Pabokory, F. N., Astuti, I. F., & Kridalaksana, A. H. (2015). Implementasi Kriptografi Pengamanan Data Pada Pesan Teks , Isi File Dokumen , dan File Dokumen Menggunakan Algoritma Advanced Encryption. Informatika Mulawarman: Jurnal Ilmiah Ilmu Komputer, 10(1), 20–31. https://doi.org/http://dx.doi.org/10.30872/jim.v10i1.23

Sari, C. A., Rachmawanto, E. H., Utomo, D. W., & Sani, R. R. (2016). Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting. Journal of Applied Intelligent System, 1(3), 179–190. https://doi.org/https://doi.org/ 10.33633/jais.v1i3.1252

Simatupang, N. A., & Hasibuan, N. A. (2018). Keamanan File Teks Menggunakan Algoritma Government Standard ( GOST ). Pelita Informatika, 17(4), 490–494.

Susianto, D., & Rachmawati, A. (2018). Implementasi dan Analisis Jaringan Menggunakan Wireshark , Cain and Abels , Network Minner ( Studi Kasus : AMIK Dian Cipta Cendikia ). Jurnal Cendikia, 16(2), 120–125.

Udoyono, K., & Saepudin, Ah. (2018). Pengamanan Basis Data Sistem Penjualan Dengan Menggunakan Teknik Enkripsi Kriptografi GOST. Jurnal Teknologi Informasi Dan Komunikasi STMIK Subang, 13(1), 1–18.

Umum, K. P. Perubahan Terhadap Peraturan Komisi Pemilihan Umum Nomor 09 Tahun 2009 Tentang Tahapan, Program, dan Jadwal

Penyelenggaraan Pemilihan Anggota DPR, DPD, dan DPRD Tahun 2009. , (2008).

Wijaya, N. (2017). Perancangan Aplikasi Promosi Songket Palembang Berbasis Android. JUSIM, 2(2), 10–22.

Wijaya, N., Irsyad, H., & Taqwiym, A. (2017). Design Verification Using Palmprint. TEKNOMATIKA, 07(02), 36–46.

Yasa, G. I. (2015). Keamanan pada Grid Computing~Survey Paper. Elkawnie: Journal of Islamic Science and Technology, 1(2), 199–212. https://doi.org/10.22373/ekw.v1i2.539




DOI: http://dx.doi.org/10.22373/ekw.v6i1.6211

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Novan Wijaya

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

P-ISSN : 2460-8912
E-ISSN : 2460-8920

ELKAWNIE

Creative Commons License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Elkawnie: Journal of Islamic Science and Technology in 2022. Published by Faculty of Science and Technology in cooperation with Center for Research and Community Service (LP2M), UIN Ar-Raniry Banda Aceh, Aceh, Indonesia.

View full page view stats report click here

Flag Counter