Comparative Analysis Between Advanced Encryption Standard and Fully Homomorphic Encryption Algorithm to Secure Data in Financial Technology Applications
Abstract
Keywords
References
C. M. Annur, “Ada 366 Anggota Asosiasi Fintech di Indonesia hingga 2022, Begini Trennya,” 2023, Accessed: Jan. 18, 2024. [Online]. Available: https://databoks.katadata.co.id/datapublish/2023/08/01/ada-366-anggota-asosiasi-fintech-di-indonesia-hingga-2022-begini-trennya
OWASP, “A02:2021 – Cryptographic Failures,” 2021, Accessed: Mar. 07, 2024. [Online]. Available: https://owasp.org/Top10/A02_2021-Cryptographic_Failures/
L. Devi and Thangamuthu, “Cyber Security - Data Privacy and Data Security,” Cyber Security, no. 2021, pp. 15–20, 2021.
A. Calder and S. Watkins, “IT Governance, An International Guide to Data Security and ISO27001/ISO270002,” 2020.
E. S. Marsiani, I. Setiadi, and A. Cahyo, “Implementasi Sistem Keamanan Aes 256-Bit Gcm Guna Mengamankan Data Pribadi,” 2021.
Nurdin, R. Ratnadewi, and N. K. Dian R, “Sms Encryption Application Using 3Des (Triple Data Encryption Standard) Algorithm Based on Android,” IOP Conf. Series: Journal of Physics: Conf. Series 1363 (2019) 012074, 2019.
N. Nurdin, B. Bustami, M. Hutomi, M. Elveny and R. Syah, “Implementation of the BFS algorithm and web scraping techniques for online shop detection in Indonesia,” Journal of Theoretical and Applied Information Technology., vol. 99, no. 12, pp. 2878-2889, 2021.
M. Azhari, J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” Jurnal Pendidikan Sains dan Komputer, vol. 2, no. 1, pp. 2809–476, 2022, doi: 10.47709/jpsk.v2i1.1390.
G. Golovko and M. Tolochyn, “Practical Application of The Aes Encryption Method,” Control, Navigation and Communication Systems, vol. 4, no. 2022, 2022.
T. Hidayat and R. Mahardiko, “A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing,” International Journal of Artificial Intelligence Research, vol. 4, no. 1, Apr. 2020, doi: 10.29099/ijair.v4i1.154.
M. M. S. Altaee and M. Alanezi, “Enhancing cloud computing security by paillier homomorphic encryption,” International Journal of Electrical and Computer Engineering, vol. 11, no. 2, pp. 1771–1779, Apr. 2021, doi: 10.11591/ijece.v11i2.pp1771-1779.
G. Ramtri and C. Patel, “Secure Banking Transactions Using RSA and Two Fish Algorithms,” in International Conference on Emerging Trends in Information Technology and Engineering, ic-ETITE 2020, Institute of Electrical and Electronics Engineers Inc., Feb. 2020. doi: 10.1109/ic-ETITE47903.2020.236.
R. Ganeshan, K. Giri, K. Reddy, A. V. S. Manikanta, and P. V Sai Lasya, “AES Algorithm for Advanced Security In Online Banking,” International Journal Of Scientific & Technology Research, vol. 9, no. Issue 04, APRIL 2020, 2020, [Online]. Available: www.ijstr.org
S. S. Muna, N. Nurdin, and T. Taufiq, “Comparative Analysis of State Universities on Website Performance in Aceh Using the PIECES Method,” Journal Of Informatics And Telecommunication Engineering, vol. 7, no. 1, pp. 71–83, Jul. 2023, doi: 10.31289/jite.v7i1.9167.
M. N. Rashid, L. H. Abed, and W. K. Awad, “Financial information security using hybrid encryption technique on multi-cloud architecture,” Bulletin of Electrical Engineering and Informatics, vol. 11, no. 6, pp. 3450–3461, Dec. 2022, doi: 10.11591/eei.v11i6.3967.
T. Hidayat and R. Mahardiko, “Data Encryption Algorithm Aes By Using Blockchain Technology: A Review,”Jurnal Dokumentasi Dan Informasi, vol. 42, no. 1, p. 19, Nov. 2021, doi: 10.14203/j.baca.v42i1.643.
U. Wahyuningsih et al., “Analisis Proses Enkripsi Algoritma Kriptografi Modern Advanced Encryption Standard (Aes),” Adijaya Jurnal Multidisiplin, vol. 01, no. 2023, pp. 380–387, 2023, [Online]. Available: https://e-journal.naureendigition.com/index.php/mj
I. Iliashenko and V. Zucca, “Faster homomorphic comparison operations for BGV and BFV. Pro-ceedings on Privacy Enhancing Technologies,” no. 3, 2021, doi: 10.2478/popets-2021-0046ï.
I. Putu, A. Eka Pratama, I. Made, and S. Raharja, “Node.js Performance Benchmarking and Analysis at Virtualbox, Docker, and Podman Environment Using Node-Bench Method,” 2023. [Online]. Available: www.joiv.org/index.php/joiv
T. Kim, Y. Oh, and H. Kim, “Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption,” Security and Communication Networks, vol. 2020, 2020, doi: 10.1155/2020/4195852.
DOI: http://dx.doi.org/10.24014/coreit.v10i2.30809
Refbacks
- There are currently no refbacks.
Jurnal CoreIT by http://ejournal.uin-suska.ac.id/index.php/coreit/ is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. |