Jurnal Teknologi Informasi dan Ilmu Komputer (Dec 2022)

Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy

  • Diah Ratih Destyorini,
  • Ari Kusyanti,
  • Reza Andria Siregar

DOI
https://doi.org/10.25126/jtiik.2022976768
Journal volume & issue
Vol. 9, no. 7

Abstract

Read online

Pengamanan data merupan bagian penting dalam penerapan jaringan berbasis Internet of things (IoT). Sistem IoT membutuhkan sebuah protokol komunikasi, seperti Bluetooth Low Energy (BLE). BLE dinilai cepat dan hemat energi dalam pengiriman data jarak dekat. BLE digunakan sebagai komunikasi client-server yang menerima data dari sensor. Pengiriman data tidak aman tanpa adanya proses pengaman data. Kriptografi menjadi salah satu pilihan dalam pengaman data. Pada pengembangan diperlukan pertimbangan beberapa aspek seperti, resource yang digunakan, serta waktu untuk proses enkripsi dan dekripsi. Pada penelitian ini algoritme MORUS V2 dipilih untuk mengamankan data dari serangan. Algoritme ini mudah diimplementasikan pada hardware. Kecepatan dari algoritme ini dapat mencapai 0,69 cpb, lebih cepat dari algoritme lain. Proses enkripsi data dari sensor dilakukan pada server hingga menghasilkan ciphertext. Kemudian akan dilakukan dekripsi pada ciphertext ketika diterima oleh client, hingga plaintext ditampilkan. Dari hasil pengujian algoritme MORUS V2 telah berhasil diimplementasikan melalui pengujian test vector dengan nilai keystream yang sama. Pengujian confidentiality telah berhasil dilakukan melalui proses enkripsi dan dekripsi. Pada pengujian serangan pasif berhasil dilakukan dengan hasil nilai plaintext tidak diketahui ketika data dikirim, serta tidak ada perubahan ketika data sampai pada client. Pengujian serangan aktif menggunakan known-plaintext attack (KPA) dinyatakan gagal dalam memperoleh nilai plaintext. Abstract Data security is an essential part of implementing an Internet of things (IoT) based network. IoT systems require a communication protocol, such as Bluetooth Low Energy (BLE). BLE is considered fast and energy-efficient in sending data over short distances. BLE is used as a client-server communication that receives data from sensors. Data transmission will be insecure without a data security process. Cryptography is one of the options for securing data. The development requires consideration of several aspects, such as the resources used, as well as the time for the encryption and decryption process. In research, the MORUS V2 algorithm was chosen to secure data from attacks. This algorithm is easy to implement on hardware. The speed of this algorithm can reach 0.69 CPB, faster than other algorithms. The data encryption process from the sensor is carried out on the server to produce ciphertext. Then decryption will be carried out on the ciphertext when received by the client until the plaintext is displayed. From the test results, the MORUS V2 algorithm has been successfully implemented through test vector testing with the same keystream value. Confidentiality testing has been successfully carried out through encryption and decryption processes. The passive attack test was successfully carried out with the result that the plaintext value was unknown when the data was sent, and there was no change when the data arrived at the client. Active attack testing using a known-plaintext attack (KPA) is declared to have failed in obtaining the plaintext value.