Please use this identifier to cite or link to this item:
http://repository.ipb.ac.id/handle/123456789/26740| Title: | Analisis hasil enkripsi file wave menggunakan sandi algoritme berkelamp-massey |
| Authors: | Hanifah, Anna |
| Issue Date: | 2009 |
| Publisher: | IPB (Bogor Agricultural University) |
| Abstract: | Secured voice data transfer is an important thing to be noticed, especially when dealing with confidential data. A technique used in assuring the transfer is encrypting the data. This technique applied symmetric key stream cipher Left Feedback Shift Register (LFSR) generator. The key developed by LFSR generator also contains high level of safety because it has semirandom byte stream key with large period. However, the influence of voice encryption using LFSR symmetric key to the wave format files is not widely known. Besides, this technique's safety level must be examined further as a consideration for larger use. This research tends to test the impact of encryption using LFSR symmetric key stream cipher on voice recorded as wave file format, and its safety level. Wave files employed on this research recorded using Sound Recorder application on Windows Operation System. These files have various fast and slow rythm. The result of this research was the change on the voice after being encrypted, with different intensity of noise, that will affect the clarity of voice's message contents. Some voices have message that could be identified well, and others couldnn't be identified at all. The result of the analysis showed that the factors influence the encryption were the rythm of the voice, and the type of polynomial applied (primitive / non primitive; polynomial degree, and linear complexity measured by Berlekamp- Massey Algorithm). Furthermore, the encrypted voices could be recovered to their genuine source while the key to decrypt is similar with the encryption key. |
| URI: | http://repository.ipb.ac.id/handle/123456789/26740 |
| Appears in Collections: | UT - Computer Science |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| G10aha_abstract.ps Restricted Access | PostScript | 9.05 MB | Postscript | View/Open |
| G10aha.ppt Restricted Access | 606.04 kB | Microsoft Powerpoint | View/Open | |
| G10aha.pdf Restricted Access | Full Text | 1.23 MB | Adobe PDF | View/Open |
| Cover G10aha.pdf Restricted Access | Cover | 883.13 kB | Adobe PDF | View/Open |
| Abstract G10aha.pdf Restricted Access | Abstract | 321.84 kB | Adobe PDF | View/Open |
| Bab I. Pendahuluan G10aha.pdf Restricted Access | Bab I | 341.69 kB | Adobe PDF | View/Open |
| Bab II. Tinjauan Pustaka G10aha.pdf Restricted Access | Bab II | 389.34 kB | Adobe PDF | View/Open |
| Bab III. Metode Penelitian G10aha.pdf Restricted Access | Bab III | 359.18 kB | Adobe PDF | View/Open |
| Bab IV. Hasil & Pembahasan G10aha.pdf Restricted Access | Bab IV | 423.16 kB | Adobe PDF | View/Open |
| Bab V. Simpulan G10aha.pdf Restricted Access | Bab V | 341.2 kB | Adobe PDF | View/Open |
| Daftar Pustaka G10aha.pdf Restricted Access | Daftar Pustaka | 324.98 kB | Adobe PDF | View/Open |
| Lampiran G10aha.pdf Restricted Access | Lampiran | 455.01 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.