COMBINATION OF GNU PRIVACY GUARD AND HAMMING DISTANCE FOR EMAIL SECURITY AND CERTIFICATION PATHS

Main Article Content

Matheus Supriyanto Rumetna

Abstract

Email is one of the advanced features related to electronic correspondence by utilizing internet technology. One of the reasons why many people use email, because it provides an easy and fast way to send information. But email is also inseparable from security problems such as being intercepted, forged, infiltrated by viruses, spamming, mailbombing, mail relay. But email confidentiality is threatened not only by hackers, but by system administrators themselves. One way to overcome this is to encrypt the email using Gnu PG. So, the focus of this research is on email security issues as well as to create a trusted certification path. In this study, an authentication protocol is proposed that makes the certificate repository size as log2 N using the concept of Hamming Distance, convincingly to create a secure certification path from one node to another. It also provides a public key management mechanism for issuing, updating and revoking certificates between nodes based on Hamming Distance.

Downloads

Download data is not yet available.

Article Details

How to Cite
Rumetna, M. (2021). COMBINATION OF GNU PRIVACY GUARD AND HAMMING DISTANCE FOR EMAIL SECURITY AND CERTIFICATION PATHS. Electro Luceat, 7(2), 151-160. https://doi.org/10.32531/jelekn.v7i2.397
Section
Articles

References

[1] M. Tariq Banday, “Effectiveness and Limitations of E-Mail Security Protocols,” Int. J. Distrib. Parallel Syst., vol. 2, no. 3, pp. 38–49, 2011, doi: 10.5121/ijdps.2011.2304.
[2] S. Gavankar and S. Vidhani, “Email Security System,” vol. 8, no. 3, pp. 347–351, 2017.
[3] E. Ismaredah, “Keamanan E-Mail Menggunakan Metode Enkripsi Gnupg Dengan Squirellmail Dan Thunderbird,” Jupiter, vol. 7, no. 2, pp. 13–22, 2015, [Online]. Available: https://media.neliti.com/media/publications/289148-keamanan-e-mail-menggunakan-metode-enkri-2fb119a3.pdf.
[4] T. N. Lina, D. Manongga, and A. Iriani, “PENERAPAN FRAMEWORK KNOWLEDGE MANAGEMENT PADA UKM KULIT PARI YOGYAKARTA,” in Seminar Nasional GEOTIK, 2017, pp. 139–145.
[5] M. S. Rumetna, M. Pieter, and M. Manurung, “APLIKASI PENGENALAN KARAKTER ALFANUMERIK MENGGUNAKAN ALGORITMA HAMMING DISTANCE,” Pros. SNATIF, no. 4, pp. 77–84, 2017, [Online]. Available: https://media.neliti.com/media/publications/173678-ID-aplikasi-pengenalan-karakter-alfanumerik.pdf.
[6] T. N. Lina and Sem, “PENERAPAN METODE DECISION TREE UNTUK PENENTUAN NILAI PRINSIP-PRINSIP E-PROCUREMENT,” in Seminar Nasional GEOTIK, 2017, pp. 10–19.
[7] M. S. Rumetna and I. Sembiring, “PEMANFAATAN CLOUD COMPUTING BAGI USAHA KECIL MENENGAH (UKM),” in Prosiding Seminar Nasional Geotik, 2017, no. ISSN:2580-8796, pp. 1–9.
[8] M. S. Rumetna, “Pemanfaatan Cloud Computing Pada Dunia Bisnis: Studi Literatur,” J. Teknol. Inf. dan Ilmu Komput., vol. 5, no. 3, pp. 305–314, 2018, doi: 10.25126/jtiik.201853595.
[9] H. Hamid, “Analisis Keamanan Aplikasi Email Bawaan Android Dan Gmail Pada Jaringan Nirkabel,” Teknoin, vol. 23, no. 2, pp. 125–136, 2017, doi: 10.20885/teknoin.vol23.iss2.art5.
[10] B. Sutedjo and D. Oetomo, “Efektivitas Email Untuk Pemasaran,” J. Eksplor. Karya Sist. Inf. dan Sains, vol. 2, no. 2, 2015, [Online]. Available: https://ti.ukdw.ac.id/ojs/index.php/eksis/article/view/390.
[11] K. Sivaraman and P. Arumugam, “The security related to electronic mail,” Int. J. Pure Appl. Math., vol. 119, no. 12, pp. 9665–9671, 2018, [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048791552&partnerID=40&md5=8b1073b9a96c3ce8760e28dc91e79840.
[12] S. Lee and J. Song, “Public-Key Management System using Hamming Distance for Mobile Ad Hoc Network,” vol. 6, no. 8, pp. 172–181, 2006.
[13] D. Riyadi, “STUDI ANALISIS PENGGUNAAN GNU PRIVACY GUARD (GPG) SEBAGAI ENKRIPSI KEAMANAN EMAIL BERBASIS WINDOWS,” Indonusa Eda Unggul, 2010.
[14] M. El-Dairi and R. J. House, “Optic nerve hypoplasia,” Handbook of Pediatric Retinal OCT and the Eye-Brain Connection. pp. 285–287, 2019, doi: 10.1016/B978-0-323-60984-5.00062-7.
[15] M. S. Rumetna, T. N. Lina, L. Simarmata, L. Parabang, A. Joseph, and Y. Batfin, “Pemanfaatan POM-QM Untuk Menghitung Keuntungan Maksimum UKM Aneka Cipta Rasa (ACR) Menggunakan Metode Simpleks,” in GEOTIK, 2019, pp. 12–22.
[16] T. N. Lina et al., “PENERAPAN METODE SIMPLEKS DALAM OPTIMALISASI KEUNTUNGAN HASIL PRODUKSI LEMON CINA DAN DAUN JERUK PURUT,” Elektro Luceat, vol. 6, no. 1, 2020.
[17] M. S. Rumetna et al., “BERBASIS WEBSITE PADA PERUSAHAN CENDRAWASIH WIPUTRA MANDIRI KOTA SORONG DESIGN OF A WEBSITE-BASED DEMAND INFORMATION SYSTEM IN CENDRAWASIH WIPUTRA MANDIRI COMPANY,” Elektro Luceat, vol. 7, no. 1, pp. 10–19, 2021.
[18] M. S. Rumetna et al., “PENDAMPINGAN DAN PELATIHAN PENERAPAN METODE SIMPLEKS PADA USAHA DAGANG BINTANG TIURMA,” J. Abdimas Bina Bangsa, vol. 01, no. 02, pp. 205–214, 2020.
[19] M. S. Rumetna, T. N. Lina, T. P. Sari, P. Mugu, A. Assem, and R. Sianturi, “Optimasi Jumlah Produksi Roti Menggunakan Program Linear Dan Software POM-QM,” Comput. Based Inf. Syst. J., vol. 09, no. 01, pp. 42–49, 2021.
[20] S. Rumalutur, Alimuddin, and E. P. Sianipar, “SISTEM KONTROL OTOMATIS PENGISIAN TANGKI BBM DAN MONITORING SUHU MENGGUNAKAN PLC,” J. Elektro Luceat, vol. 6, no. 1, 2020.
Abstract viewed = 8 times
PDF (Bahasa Indonesia) downloaded = 8 times