PENERAPAN KODE REED SOLOMON PADA KRIPTOSISTEM MCELIECE
DOI:
https://doi.org/10.24853/fbc.9.1.79-88Keywords:
Komputer Kuantum, Kriptografi, Kriptosistem McEliece, Kode Koreksi Eror, Kode Reed SolomonAbstract
Era modern ini, keamanan pesan dalam suatu transmisi tergolong lemah. Berbagai algoritme kriptosistem rentan dipecahkan oleh komputer kuantum yang mampu menyelesaikan perhitungan lebih cepat dibanding komputer konvensional. Kriptosistem McEliece tergolong aman digunakan pasca komputer kuantum karena memanfaatkan kode pengoreksi eror. Algoritmenya didasarkan pada penambahan eror pada pesan sehingga pesan tersandi dan tidak dapat diserang oleh pihak lain. Kode Reed Solomon merupakan kode berbasis koreksi eror dengan parameter tertentu. Pada artikel ini akan dijelaskan penerapan kode Reed Solomon dengan panjang 15 bit yang dapat mengoreksi hingga 3 eror pada kriptosistem McEliece.References
Apriansyah, A., Fauziah, dan Hayati, N. 2019. Implementasi Algoritma Reed Solomon Codes pada Proses Encoding QR Code pada Sistem Absensi. Jurnal Infomedia, Vol 4 (2), pp:75-80.
Bernstein, D.J., Buchmann, J., and Dahmen,E. 2009. Post-Quantum Cryptography, Berlin: Springer.
Chen, L., Jordan, S., Liu, Y.K., Moody, D., Peralta, R., Perlner, R., and Smith-Tone, D. 2016. Report on Post-Quantum Cryptography. U.S. Department of Commerce, National Institute of Standards and Technology. [Online] Tersedia: https://csrc.nist.gov/publications/detail/nistir/8105/final. [02 Januari 2023].
Gauthier, V., Otmani, A., and Tillich, J.P. 2012. A Distinguisher-Based Attack on a Variant of McEliece’s Cryptosystem Based on Reed-Solomon Codes. [Online] Tersedia: https://arxiv.org/abs/1204.6459 [03 Januari 2023].
Hakim, R.H., Rahman, A., Amin, D.E., Roza, W., dan Rahim, E. 2014. Implementasi Encoder Reed-Solomon pada FGPA Berbasis CCSDS. Jurnal Teknologi Dirgantara. Vol 12 (2), pp:116-127.
Jamal, R.P., Haryanto, L., dan Amir, A.K. (2014). Konstruksi Kode Reed-Solomon sebagai Kode Siklik dengan Polinomial Generator. Paper of Semantic Scholar. Makassar. [Online] Tersedia: https://www.semanticscholar.org/paper/Konstruksi-Kode-Reed-Solomon-sebagai-Kode-Siklik-Jamal-Haryanto/22344adaeb16fcfdb51e32f451e510e8d87ea. [05 Januari 2023].
Jariyah, A., Suwadi, dan Hendrantoro, G. 2013. Pengkodean Kanal Reed Solomon Berbasis FGPA untuk Transmisi Citra pada Satelit Nano. Jurnal Teknik Pomits. Vol 2 (1), pp:51-56.
Kartika, W., Mustika I.W., dan Bejo, A. 2015. Implementasi Data Kirim dan Terima dari Reed Solomon Code pada Controller Area Network. Proceeding Departemen Teknik Elektro dan Teknologi Informasi. UGM Yogyakarta.
McEliece, R.J. 1978. A Public-Key Cryptosystem Based On Algebraic Coding Theory. DSN Progress Report.
Menezes, A., Oorschot, P., and Vanstone, S. 1997. Handbook of Applied Cryptography. CRC Press.
Reed, I.S., and Solomon, G. 1960. Polynomial Codes over Certain Finite Fields. Journal of the Society for Industrial and Applied Mathematics. Vol 8 (2), pp:300-304.
Roering, C. 2013. Coding Theory-Based Cryptography: McEliece Cryptosystem in Sage. Disertasi Honors Theses.
Sinaga, M.C. 2017. Kriptografi Python. Medan: INA-Rxiv.
Suryono, F.N. 2022. Penerapan Reed-Solomon Code dalam Pembuatan Self-Correcting Data. Makalah IF2120 Matematika Diskrit Program Studi Teknik Informatika, STEI Bandung.
Widiastuti, N., Lestari, D., dan Dhoruri, A. 2016. Sifat dan Karakteristik Kode Reed Solomon Beserta Aplikasinya pada Steganography. Seminar Nasional Matematika dan Pendidikan Matematika UNY 2016.
Wu, T., dan Wang, R. 2017. Stream Cipher by Reed-Solomon Code. Disertasi Conference Paper.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).