Please use this identifier to cite or link to this item: http://repository.ipb.ac.id/handle/123456789/26740
Title: Analisis hasil enkripsi file wave menggunakan sandi algoritme berkelamp-massey
Authors: Hanifah, Anna
Issue Date: 2009
Publisher: IPB (Bogor Agricultural University)
Abstract: Secured voice data transfer is an important thing to be noticed, especially when dealing with confidential data. A technique used in assuring the transfer is encrypting the data. This technique applied symmetric key stream cipher Left Feedback Shift Register (LFSR) generator. The key developed by LFSR generator also contains high level of safety because it has semirandom byte stream key with large period. However, the influence of voice encryption using LFSR symmetric key to the wave format files is not widely known. Besides, this technique's safety level must be examined further as a consideration for larger use. This research tends to test the impact of encryption using LFSR symmetric key stream cipher on voice recorded as wave file format, and its safety level. Wave files employed on this research recorded using Sound Recorder application on Windows Operation System. These files have various fast and slow rythm. The result of this research was the change on the voice after being encrypted, with different intensity of noise, that will affect the clarity of voice's message contents. Some voices have message that could be identified well, and others couldnn't be identified at all. The result of the analysis showed that the factors influence the encryption were the rythm of the voice, and the type of polynomial applied (primitive / non primitive; polynomial degree, and linear complexity measured by Berlekamp- Massey Algorithm). Furthermore, the encrypted voices could be recovered to their genuine source while the key to decrypt is similar with the encryption key.
URI: http://repository.ipb.ac.id/handle/123456789/26740
Appears in Collections:UT - Computer Science

Files in This Item:
File Description SizeFormat 
G10aha_abstract.ps
  Restricted Access
PostScript9.05 MBPostscriptView/Open
G10aha.ppt
  Restricted Access
606.04 kBMicrosoft PowerpointView/Open
G10aha.pdf
  Restricted Access
Full Text1.23 MBAdobe PDFView/Open
Cover G10aha.pdf
  Restricted Access
Cover883.13 kBAdobe PDFView/Open
Abstract G10aha.pdf
  Restricted Access
Abstract321.84 kBAdobe PDFView/Open
Bab I. Pendahuluan G10aha.pdf
  Restricted Access
Bab I341.69 kBAdobe PDFView/Open
Bab II. Tinjauan Pustaka G10aha.pdf
  Restricted Access
Bab II389.34 kBAdobe PDFView/Open
Bab III. Metode Penelitian G10aha.pdf
  Restricted Access
Bab III359.18 kBAdobe PDFView/Open
Bab IV. Hasil & Pembahasan G10aha.pdf
  Restricted Access
Bab IV423.16 kBAdobe PDFView/Open
Bab V. Simpulan G10aha.pdf
  Restricted Access
Bab V341.2 kBAdobe PDFView/Open
Daftar Pustaka G10aha.pdf
  Restricted Access
Daftar Pustaka324.98 kBAdobe PDFView/Open
Lampiran G10aha.pdf
  Restricted Access
Lampiran455.01 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.