Main Article Content
Abstract
Pengamaman informasi sudah menjadi hal yang wajib dalam era revolusi teknologi informasi. Penggunaan internet dalam perangkan cerdas dan multiplatform akan menjadi celah bagi kriptanalis untuk mencurangi informasi. Kriptografi adalah salah satu teknik pengamanan informasi yang hingga saat ini memiliki banyak metode didalamnya. Meskipun demikian, informasi yang sandikan akan tetap memiliki celah kelemahan. Penggabungan teknik kriptogarfi dengan metode fuzzy banyak diusulkan dalam rangka peningkatan kualitas informsi yang disandikan. Dengan melakukan penelusuran sistematis literatur, ditemukan beberapa artikel yang mulai menggabungkan kriptografi dan fuzzy. Penelusiran ini bertujuan untuk melihat bagaimana peranan fuzzy dalam bidang kriptografi. Hasil yang diperoleh adalah adanya peningkatan kualitas bentuk pengamanan informsi yang dipadukan dengan fuzzy melalui beberapa cara. Selain itu, penggunaan fuzzy juga tidak terbatas dalam peningkatan keamanan. Fuzzy juga berperan dalam pemilihan kunci dan password terbaik serta penerbitan angka acak dari sebuah PRNG.
Keywords
Article Details
References
- Abdullah, K., Bakar, S. A., Kamis, N. H., & Aliamis, H. (2017). RSA cryptosystem with fuzzy set theory for encryption and decryption. 030001. https://doi.org/10.1063/1.5012147
- Amrulloh, M. M., & Ahmad, T. (2020a). Utilizing fuzzy logic in developing reversible data hiding method. International Journal of Intelligent Engineering and Systems, 13(5), 327–336. https://doi.org/10.22266/ijies2020.1031.30
- Amrulloh, M. M., & Ahmad, T. (2020b). Utilizing fuzzy logic in developing reversible data hiding method. International Journal of Intelligent Engineering and Systems, 13(5), 327–336. https://doi.org/10.22266/ijies2020.1031.30
- Anikin, I. v., & Alnajjar, K. (2017). Correlation immune pseudo-random number generator based on fuzzy logic. 2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), 1–4. https://doi.org/10.1109/ICIEAM.2017.8076445
- Anikin, I. v, & Alnajjar, K. (2018). Increasing the quality of pseudo-random number generator based on fuzzy logic. Journal of Physics: Conference Series, 1096, 012193. https://doi.org/10.1088/1742-6596/1096/1/012193
- Bansal, M., Grover, D., Sharma, D., & Professor, A. (2017). SECURE MINING AND SHARING OF FINANCIAL DATA:FUZZY LOGIC AND CRYPTOGRAPHY. / Indian Journal of Computer Science and Engineering (IJCSE), 8(4).
- Bhowmik, A., & Karforma, S. (2020a). A Key Generation technique using concept of Recurrence Relation and Fuzzy logic against Security Breach in Wireless Communication.
- Bhowmik, A., & Karforma, S. (2020b). A Key Generation technique using concept of Recurrence Relation and Fuzzy logic against Security Breach in Wireless Communication.
- Bhowmik, A., Karforma, S., Dey, J., & Sarkar, A. (2020). Fuzzy-Based Session Key as Restorative Power of Symmetric Key Encryption for Secured Wireless Communication (pp. 171–183). https://doi.org/10.1007/978-981-15-0829-5_17
- Brereton, P., Kitchenham, B. A., Budgen, D., Turner, M., & Khalil, M. (2007). Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software, 80(4), 571–583. https://doi.org/10.1016/j.jss.2006.07.009
- Chemlal, R. (2020a). A note on combining chaotic dynamical systems using the fuzzy logic XOR operator.
- Chemlal, R. (2020b). A note on combining chaotic dynamical systems using the fuzzy logic XOR operator.
- Eid, M. M., & Mohamed, M. A. (2017). A secure multimodal authentication system based on chaos cryptography and fuzzy fusion of iris and face. 2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 Intl Conf on New Paradigms in Electronics & Information Technology (PEIT), 163–171.
- El-Khamy, S. E., & Mohamed, A. G. (2018). Image keyed PN sequence generator and authentication technique based on choquet fuzzy integral. 2018 35th National Radio Science Conference (NRSC), 293–299. https://doi.org/10.1109/NRSC.2018.8354376
- KISHOR, K. S., & SNEHLATA, B. (2020). FUZZY LOGIC IN TERMS OF BIOMETRICS. I-Manager’s Journal on Image Processing, 7(4), 17. https://doi.org/10.26634/jip.7.4.17775
- Muthumeenakshi, M., Archana, T., & Muralikrishna, P. (2017). FUZZY APPLICATION IN SECURED DATA TRANSMISSION. International Journal of Pure and Applied Mathematics, 116(3), 711–715. https://doi.org/10.12732/ijpam.v116i3.17
- Ngoc Nguyen, T. T., Kaddoum, G., & Gagnon, F. (2018). Implementation of a Chaotic True Random Number Generator Based on Fuzzy Modeling. 2018 16th IEEE International New Circuits and Systems Conference (NEWCAS), 238–242. https://doi.org/10.1109/NEWCAS.2018.8585501
- Pattanayak, S., & Ludwig, S. A. (2019). Improving Data Privacy Using Fuzzy Logic and Autoencoder Neural Network. 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1–6. https://doi.org/10.1109/FUZZ-IEEE.2019.8858823
- Sadkhan, S. B., & Salman, A. O. (2018). Fuzzy Logic for Performance Analysis of AES and Lightweight AES. 2018 International Conference on Advanced Science and Engineering (ICOASE), 318–323. https://doi.org/10.1109/ICOASE.2018.8548832
- Sailaja, R., Rupa, C., & Chakravarthy, A. S. N. (2018). A novel integrated approach using Euclid’s and fuzzy logic for secure communication. International Journal of Information Privacy, Security and Integrity, 3(4), 253. https://doi.org/10.1504/IJIPSI.2018.096131
- Sethuraman, P., Tamizharasan, P. S., & Arputharaj, K. (2019). Fuzzy Genetic Elliptic Curve Diffie Hellman Algorithm for Secured Communication in Networks. Wireless Personal Communications, 105(3), 993–1007. https://doi.org/10.1007/s11277-019-06132-4
- Singh, G., & Garg, S. (2020a). Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security. 2020 International Conference on Intelligent Engineering and Management (ICIEM), 327–330. https://doi.org/10.1109/ICIEM48762.2020.9159961
- Singh, G., & Garg, S. (2020b). Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security. 2020 International Conference on Intelligent Engineering and Management (ICIEM), 327–330. https://doi.org/10.1109/ICIEM48762.2020.9159961
- Tubthong, P., & Suttichaya, V. (2017). The Fuzzy Scheduling Algorithm for the Parallel Key Searching Problem on Cloud Environment. 2017 21st International Computer Science and Engineering Conference (ICSEC), 1–5. https://doi.org/10.1109/ICSEC.2017.8443824
- Vanmathi, C., & Prabu, S. (2018). Image Steganography Using Fuzzy Logic and Chaotic for Large Payload and High Imperceptibility. International Journal of Fuzzy Systems, 20(2), 460–473. https://doi.org/10.1007/s40815-017-0420-0
- Yusuf, H. S., & Hagras, H. (2018). Towards Image Steganography Using Type-2 Fuzzy Logic and Edge Detection. 2018 10th Computer Science and Electronic Engineering (CEEC), 75–78. https://doi.org/10.1109/CEEC.2018.8674225
- Yuvaraja, T., & Sabeenian, R. S. (2019). Performance analysis of medical image security using steganography based on fuzzy logic. Cluster Computing, 22(S2), 3285–3291. https://doi.org/10.1007/s10586-018-2096-0
References
Abdullah, K., Bakar, S. A., Kamis, N. H., & Aliamis, H. (2017). RSA cryptosystem with fuzzy set theory for encryption and decryption. 030001. https://doi.org/10.1063/1.5012147
Amrulloh, M. M., & Ahmad, T. (2020a). Utilizing fuzzy logic in developing reversible data hiding method. International Journal of Intelligent Engineering and Systems, 13(5), 327–336. https://doi.org/10.22266/ijies2020.1031.30
Amrulloh, M. M., & Ahmad, T. (2020b). Utilizing fuzzy logic in developing reversible data hiding method. International Journal of Intelligent Engineering and Systems, 13(5), 327–336. https://doi.org/10.22266/ijies2020.1031.30
Anikin, I. v., & Alnajjar, K. (2017). Correlation immune pseudo-random number generator based on fuzzy logic. 2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), 1–4. https://doi.org/10.1109/ICIEAM.2017.8076445
Anikin, I. v, & Alnajjar, K. (2018). Increasing the quality of pseudo-random number generator based on fuzzy logic. Journal of Physics: Conference Series, 1096, 012193. https://doi.org/10.1088/1742-6596/1096/1/012193
Bansal, M., Grover, D., Sharma, D., & Professor, A. (2017). SECURE MINING AND SHARING OF FINANCIAL DATA:FUZZY LOGIC AND CRYPTOGRAPHY. / Indian Journal of Computer Science and Engineering (IJCSE), 8(4).
Bhowmik, A., & Karforma, S. (2020a). A Key Generation technique using concept of Recurrence Relation and Fuzzy logic against Security Breach in Wireless Communication.
Bhowmik, A., & Karforma, S. (2020b). A Key Generation technique using concept of Recurrence Relation and Fuzzy logic against Security Breach in Wireless Communication.
Bhowmik, A., Karforma, S., Dey, J., & Sarkar, A. (2020). Fuzzy-Based Session Key as Restorative Power of Symmetric Key Encryption for Secured Wireless Communication (pp. 171–183). https://doi.org/10.1007/978-981-15-0829-5_17
Brereton, P., Kitchenham, B. A., Budgen, D., Turner, M., & Khalil, M. (2007). Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software, 80(4), 571–583. https://doi.org/10.1016/j.jss.2006.07.009
Chemlal, R. (2020a). A note on combining chaotic dynamical systems using the fuzzy logic XOR operator.
Chemlal, R. (2020b). A note on combining chaotic dynamical systems using the fuzzy logic XOR operator.
Eid, M. M., & Mohamed, M. A. (2017). A secure multimodal authentication system based on chaos cryptography and fuzzy fusion of iris and face. 2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 Intl Conf on New Paradigms in Electronics & Information Technology (PEIT), 163–171.
El-Khamy, S. E., & Mohamed, A. G. (2018). Image keyed PN sequence generator and authentication technique based on choquet fuzzy integral. 2018 35th National Radio Science Conference (NRSC), 293–299. https://doi.org/10.1109/NRSC.2018.8354376
KISHOR, K. S., & SNEHLATA, B. (2020). FUZZY LOGIC IN TERMS OF BIOMETRICS. I-Manager’s Journal on Image Processing, 7(4), 17. https://doi.org/10.26634/jip.7.4.17775
Muthumeenakshi, M., Archana, T., & Muralikrishna, P. (2017). FUZZY APPLICATION IN SECURED DATA TRANSMISSION. International Journal of Pure and Applied Mathematics, 116(3), 711–715. https://doi.org/10.12732/ijpam.v116i3.17
Ngoc Nguyen, T. T., Kaddoum, G., & Gagnon, F. (2018). Implementation of a Chaotic True Random Number Generator Based on Fuzzy Modeling. 2018 16th IEEE International New Circuits and Systems Conference (NEWCAS), 238–242. https://doi.org/10.1109/NEWCAS.2018.8585501
Pattanayak, S., & Ludwig, S. A. (2019). Improving Data Privacy Using Fuzzy Logic and Autoencoder Neural Network. 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1–6. https://doi.org/10.1109/FUZZ-IEEE.2019.8858823
Sadkhan, S. B., & Salman, A. O. (2018). Fuzzy Logic for Performance Analysis of AES and Lightweight AES. 2018 International Conference on Advanced Science and Engineering (ICOASE), 318–323. https://doi.org/10.1109/ICOASE.2018.8548832
Sailaja, R., Rupa, C., & Chakravarthy, A. S. N. (2018). A novel integrated approach using Euclid’s and fuzzy logic for secure communication. International Journal of Information Privacy, Security and Integrity, 3(4), 253. https://doi.org/10.1504/IJIPSI.2018.096131
Sethuraman, P., Tamizharasan, P. S., & Arputharaj, K. (2019). Fuzzy Genetic Elliptic Curve Diffie Hellman Algorithm for Secured Communication in Networks. Wireless Personal Communications, 105(3), 993–1007. https://doi.org/10.1007/s11277-019-06132-4
Singh, G., & Garg, S. (2020a). Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security. 2020 International Conference on Intelligent Engineering and Management (ICIEM), 327–330. https://doi.org/10.1109/ICIEM48762.2020.9159961
Singh, G., & Garg, S. (2020b). Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security. 2020 International Conference on Intelligent Engineering and Management (ICIEM), 327–330. https://doi.org/10.1109/ICIEM48762.2020.9159961
Tubthong, P., & Suttichaya, V. (2017). The Fuzzy Scheduling Algorithm for the Parallel Key Searching Problem on Cloud Environment. 2017 21st International Computer Science and Engineering Conference (ICSEC), 1–5. https://doi.org/10.1109/ICSEC.2017.8443824
Vanmathi, C., & Prabu, S. (2018). Image Steganography Using Fuzzy Logic and Chaotic for Large Payload and High Imperceptibility. International Journal of Fuzzy Systems, 20(2), 460–473. https://doi.org/10.1007/s40815-017-0420-0
Yusuf, H. S., & Hagras, H. (2018). Towards Image Steganography Using Type-2 Fuzzy Logic and Edge Detection. 2018 10th Computer Science and Electronic Engineering (CEEC), 75–78. https://doi.org/10.1109/CEEC.2018.8674225
Yuvaraja, T., & Sabeenian, R. S. (2019). Performance analysis of medical image security using steganography based on fuzzy logic. Cluster Computing, 22(S2), 3285–3291. https://doi.org/10.1007/s10586-018-2096-0