Main Article Content

Abstract

Pengamaman informasi sudah menjadi hal yang wajib dalam era revolusi teknologi informasi. Penggunaan internet dalam perangkan cerdas dan multiplatform akan menjadi celah bagi kriptanalis untuk mencurangi informasi. Kriptografi adalah salah satu teknik pengamanan informasi yang hingga saat ini memiliki banyak metode didalamnya. Meskipun demikian, informasi yang sandikan akan tetap memiliki celah kelemahan. Penggabungan teknik kriptogarfi dengan metode fuzzy banyak diusulkan dalam rangka peningkatan kualitas informsi yang disandikan. Dengan melakukan penelusuran sistematis literatur, ditemukan beberapa artikel yang mulai menggabungkan kriptografi dan fuzzy. Penelusiran ini bertujuan untuk melihat bagaimana peranan fuzzy dalam bidang kriptografi. Hasil yang diperoleh adalah adanya peningkatan kualitas bentuk pengamanan informsi yang dipadukan dengan fuzzy melalui beberapa cara. Selain itu, penggunaan fuzzy juga tidak terbatas dalam peningkatan keamanan. Fuzzy juga berperan dalam pemilihan kunci dan password terbaik serta penerbitan angka acak dari sebuah PRNG.

Keywords

fuzzy informasi kriptografi keamanan informasi

Article Details

References

  1. Abdullah, K., Bakar, S. A., Kamis, N. H., & Aliamis, H. (2017). RSA cryptosystem with fuzzy set theory for encryption and decryption. 030001. https://doi.org/10.1063/1.5012147
  2. Amrulloh, M. M., & Ahmad, T. (2020a). Utilizing fuzzy logic in developing reversible data hiding method. International Journal of Intelligent Engineering and Systems, 13(5), 327–336. https://doi.org/10.22266/ijies2020.1031.30
  3. Amrulloh, M. M., & Ahmad, T. (2020b). Utilizing fuzzy logic in developing reversible data hiding method. International Journal of Intelligent Engineering and Systems, 13(5), 327–336. https://doi.org/10.22266/ijies2020.1031.30
  4. Anikin, I. v., & Alnajjar, K. (2017). Correlation immune pseudo-random number generator based on fuzzy logic. 2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), 1–4. https://doi.org/10.1109/ICIEAM.2017.8076445
  5. Anikin, I. v, & Alnajjar, K. (2018). Increasing the quality of pseudo-random number generator based on fuzzy logic. Journal of Physics: Conference Series, 1096, 012193. https://doi.org/10.1088/1742-6596/1096/1/012193
  6. Bansal, M., Grover, D., Sharma, D., & Professor, A. (2017). SECURE MINING AND SHARING OF FINANCIAL DATA:FUZZY LOGIC AND CRYPTOGRAPHY. / Indian Journal of Computer Science and Engineering (IJCSE), 8(4).
  7. Bhowmik, A., & Karforma, S. (2020a). A Key Generation technique using concept of Recurrence Relation and Fuzzy logic against Security Breach in Wireless Communication.
  8. Bhowmik, A., & Karforma, S. (2020b). A Key Generation technique using concept of Recurrence Relation and Fuzzy logic against Security Breach in Wireless Communication.
  9. Bhowmik, A., Karforma, S., Dey, J., & Sarkar, A. (2020). Fuzzy-Based Session Key as Restorative Power of Symmetric Key Encryption for Secured Wireless Communication (pp. 171–183). https://doi.org/10.1007/978-981-15-0829-5_17
  10. Brereton, P., Kitchenham, B. A., Budgen, D., Turner, M., & Khalil, M. (2007). Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software, 80(4), 571–583. https://doi.org/10.1016/j.jss.2006.07.009
  11. Chemlal, R. (2020a). A note on combining chaotic dynamical systems using the fuzzy logic XOR operator.
  12. Chemlal, R. (2020b). A note on combining chaotic dynamical systems using the fuzzy logic XOR operator.
  13. Eid, M. M., & Mohamed, M. A. (2017). A secure multimodal authentication system based on chaos cryptography and fuzzy fusion of iris and face. 2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 Intl Conf on New Paradigms in Electronics & Information Technology (PEIT), 163–171.
  14. El-Khamy, S. E., & Mohamed, A. G. (2018). Image keyed PN sequence generator and authentication technique based on choquet fuzzy integral. 2018 35th National Radio Science Conference (NRSC), 293–299. https://doi.org/10.1109/NRSC.2018.8354376
  15. KISHOR, K. S., & SNEHLATA, B. (2020). FUZZY LOGIC IN TERMS OF BIOMETRICS. I-Manager’s Journal on Image Processing, 7(4), 17. https://doi.org/10.26634/jip.7.4.17775
  16. Muthumeenakshi, M., Archana, T., & Muralikrishna, P. (2017). FUZZY APPLICATION IN SECURED DATA TRANSMISSION. International Journal of Pure and Applied Mathematics, 116(3), 711–715. https://doi.org/10.12732/ijpam.v116i3.17
  17. Ngoc Nguyen, T. T., Kaddoum, G., & Gagnon, F. (2018). Implementation of a Chaotic True Random Number Generator Based on Fuzzy Modeling. 2018 16th IEEE International New Circuits and Systems Conference (NEWCAS), 238–242. https://doi.org/10.1109/NEWCAS.2018.8585501
  18. Pattanayak, S., & Ludwig, S. A. (2019). Improving Data Privacy Using Fuzzy Logic and Autoencoder Neural Network. 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1–6. https://doi.org/10.1109/FUZZ-IEEE.2019.8858823
  19. Sadkhan, S. B., & Salman, A. O. (2018). Fuzzy Logic for Performance Analysis of AES and Lightweight AES. 2018 International Conference on Advanced Science and Engineering (ICOASE), 318–323. https://doi.org/10.1109/ICOASE.2018.8548832
  20. Sailaja, R., Rupa, C., & Chakravarthy, A. S. N. (2018). A novel integrated approach using Euclid’s and fuzzy logic for secure communication. International Journal of Information Privacy, Security and Integrity, 3(4), 253. https://doi.org/10.1504/IJIPSI.2018.096131
  21. Sethuraman, P., Tamizharasan, P. S., & Arputharaj, K. (2019). Fuzzy Genetic Elliptic Curve Diffie Hellman Algorithm for Secured Communication in Networks. Wireless Personal Communications, 105(3), 993–1007. https://doi.org/10.1007/s11277-019-06132-4
  22. Singh, G., & Garg, S. (2020a). Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security. 2020 International Conference on Intelligent Engineering and Management (ICIEM), 327–330. https://doi.org/10.1109/ICIEM48762.2020.9159961
  23. Singh, G., & Garg, S. (2020b). Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security. 2020 International Conference on Intelligent Engineering and Management (ICIEM), 327–330. https://doi.org/10.1109/ICIEM48762.2020.9159961
  24. Tubthong, P., & Suttichaya, V. (2017). The Fuzzy Scheduling Algorithm for the Parallel Key Searching Problem on Cloud Environment. 2017 21st International Computer Science and Engineering Conference (ICSEC), 1–5. https://doi.org/10.1109/ICSEC.2017.8443824
  25. Vanmathi, C., & Prabu, S. (2018). Image Steganography Using Fuzzy Logic and Chaotic for Large Payload and High Imperceptibility. International Journal of Fuzzy Systems, 20(2), 460–473. https://doi.org/10.1007/s40815-017-0420-0
  26. Yusuf, H. S., & Hagras, H. (2018). Towards Image Steganography Using Type-2 Fuzzy Logic and Edge Detection. 2018 10th Computer Science and Electronic Engineering (CEEC), 75–78. https://doi.org/10.1109/CEEC.2018.8674225
  27. Yuvaraja, T., & Sabeenian, R. S. (2019). Performance analysis of medical image security using steganography based on fuzzy logic. Cluster Computing, 22(S2), 3285–3291. https://doi.org/10.1007/s10586-018-2096-0