View Item 
      •   IPB Repository
      • Dissertations and Theses
      • Undergraduate Theses
      • UT - Faculty of Mathematics and Natural Sciences
      • UT - Computer Science
      • View Item
      •   IPB Repository
      • Dissertations and Theses
      • Undergraduate Theses
      • UT - Faculty of Mathematics and Natural Sciences
      • UT - Computer Science
      • View Item
      JavaScript is disabled for your browser. Some features of this site may not work without it.

      Analisis hasil enkripsi file wave menggunakan sandi algoritme berkelamp-massey

      Thumbnail
      View/Open
      PostScript (8.838Mb)
      G10aha.ppt (606.0Kb)
      Full Text (1.196Mb)
      Cover (883.1Kb)
      Abstract (321.8Kb)
      Bab I (341.6Kb)
      Bab II (389.3Kb)
      Bab III (359.1Kb)
      Bab IV (423.1Kb)
      Bab V (341.1Kb)
      Daftar Pustaka (324.9Kb)
      Lampiran (455.0Kb)
      Date
      2009
      Author
      Hanifah, Anna
      Metadata
      Show full item record
      Abstract
      Secured voice data transfer is an important thing to be noticed, especially when dealing with confidential data. A technique used in assuring the transfer is encrypting the data. This technique applied symmetric key stream cipher Left Feedback Shift Register (LFSR) generator. The key developed by LFSR generator also contains high level of safety because it has semirandom byte stream key with large period. However, the influence of voice encryption using LFSR symmetric key to the wave format files is not widely known. Besides, this technique's safety level must be examined further as a consideration for larger use. This research tends to test the impact of encryption using LFSR symmetric key stream cipher on voice recorded as wave file format, and its safety level. Wave files employed on this research recorded using Sound Recorder application on Windows Operation System. These files have various fast and slow rythm. The result of this research was the change on the voice after being encrypted, with different intensity of noise, that will affect the clarity of voice's message contents. Some voices have message that could be identified well, and others couldnn't be identified at all. The result of the analysis showed that the factors influence the encryption were the rythm of the voice, and the type of polynomial applied (primitive / non primitive; polynomial degree, and linear complexity measured by Berlekamp- Massey Algorithm). Furthermore, the encrypted voices could be recovered to their genuine source while the key to decrypt is similar with the encryption key.
      URI
      http://repository.ipb.ac.id/handle/123456789/26740
      Collections
      • UT - Computer Science [2482]

      Copyright © 2020 Library of IPB University
      All rights reserved
      Contact Us | Send Feedback
      Indonesia DSpace Group 
      IPB University Scientific Repository
      UIN Syarif Hidayatullah Institutional Repository
      Universitas Jember Digital Repository
        

       

      Browse

      All of IPB RepositoryCollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

      My Account

      Login

      Application

      google store

      Copyright © 2020 Library of IPB University
      All rights reserved
      Contact Us | Send Feedback
      Indonesia DSpace Group 
      IPB University Scientific Repository
      UIN Syarif Hidayatullah Institutional Repository
      Universitas Jember Digital Repository