Professional Documents
Culture Documents
13589-13595
© Research India Publications. http://www.ripublication.com
Kenang Eko Prasetyo1, Tito Waluyo Purboyo2 and Randy Erfa Saputra3
Faculty of Electrical Engineering, Telkom University, Bandung, Indonesia.
13589
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 23 (2017) pp. 13589-13595
© Research India Publications. http://www.ripublication.com
• Decryption (function D) is the opposite of encryption ie In this section, we describe two main types of cryptographic
change ciphertext becomes plaintext, so it is initial / algorithms; Symmetric Key Cryptography and Asymmetric
original data. Key Cryptography [4] and also some examples in each type.
C. Data Integrity
13590
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 23 (2017) pp. 13589-13595
© Research India Publications. http://www.ripublication.com
now been replaced by the new AES algorithm an asymmetric key. When a message is sent after it is encoded
because DES has unsafe. DES belongs to a with a symmetric key.
cryptographic system of symmetry and belongs to a
An example of algorithm using asymmetric key algorithm is
block cipher type. DES operates on a 64-bit block
Rivest-Shamir-Adleman (RSA) algorithm. RSA is the first
size. DES describes 64 bits of plaintext to 64 bits of
algorithm suitable for digital signatures and encryption, and
ciphertext by using 56 bits of internal key (internal
one of the most advanced in the field of public key
key) or sub-key. The internal key is generated from
cryptography since first described in 1977. The RSA
an external key 64-bit length [7].
algorithm involves some steps, such as key generation,
2. RC6 is a cryptographic algorithm that is included in a encryption, and decryption [8].
symmetric key. This algorithm is the development of
the RC5 algorithm included in Advance Encrypt
Standard (AES). RC6 uses the core of the data- DATA COMPRESSION
dependent rotation. RC6 is an algorithm that uses
block sizes up to 128 bits, with key sizes used In this section, we describe specific examples types of Data
varying between 128, 192 and 256 bits. RC6 divides Compression Algorithms: Run Length Encoding (RLE),
the 128-bit block into four 32-bit blocks, and follows Huffman Coding, Arithmetic Coding, Punctured Elias Code,
the six basic operating rules: number, subtraction, Goldbach Code.
exclusive OR, integer multiplication, sliding bits to
the right and bending bits to the left. The main
process in this algorithm is the key scheduling and A. Run Length Encoding (RLE)
decryption of encryption.
Compression and decompression using Run length encoding
is a method used to compress data containing repetitive
characters. When the same characters are received
consecutively four or more times (more than three), this
B. Asymmetric Key Criptography algorithm compresses the data in a series of three characters.
Run-Length Encoding is an algorithm that exploits repetitive
In the mid-70s Whitfield Diffie and Martin Hellman invented characters in sequence in a data by encoding it with a string
the Asymmetric Algorithm. This encryption technique that that consists of the sum of the number of character looping
revolutionized the world of cryptography. An Asymmetric that occurs, followed by a repeating character.
key is a pair of cryptographic keys used for the encryption
process and the other for decryption. Anyone who gets a Generally, RLE algorithm is used on files that have characters
public key can use it to encrypt messages, while only one that tend to be homogeneous. Therefore, if the algorithm is
person has a certain secret in this case a private key to used universally then it is necessary to do the grouping or
disassemble the password sent to him Figure 2. transformation of similar characters / symbols. The steps of
compressing data using Run Length Encoding are:
13591
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 23 (2017) pp. 13589-13595
© Research India Publications. http://www.ripublication.com
C. Arithmetic Coding
In general, data compression algorithms are based on the
selection of ways of replacing one or more of the same
elements with a particular code. In contrast, Arithmetic
Coding replaces a series of input symbols in a data file with a
number using an arithmetic process. The longer and more
complex the encoded message, the more bits it takes to
compress and decompress the data.
The output of this Arithmetic coding is a number smaller than
1 and greater or equal to 0. This number can be uniquely
decompressed to produce a sequence of symbols used to
generate that number. To generate the output number, each
symbol that will be compressed is assigned a set of probability
values. The implementation of Arithmetic Coding should
closely regard the capabilities of the encoder and decoder,
which generally have a limited number of mantissa. This can
cause errors if an Arithmetic Coding has code with a very
long floating point.
The steps to compressing data using Arithmetic Encoding
algorithm are:
1. Set Current Interval [0,1)
2. Divide the current interval into several sub intervals
based on symbol probability; one sub interval
represents one symbol.
3. Read the “i” symbol on the message, identify the sub
interval belonging to that symbol.
4. Set Current Interval = sub interval symbol to “i”.
Figure 2: Flowchart of Run Length Encoding
5. Repeat steps 2-4 until the last symbol on the
message.
B. Huffman Coding
Huffman Algorithm is one of the oldest compression D. Punctured Elias Code
algorithms compiled by David Huffman in 1952. The
algorithm is used to create compression of the type of loss Punctured Elias Codes is a method designed by Peter Fenwick
compression, ie data compression where not one byte is lost in an experiment to improve the performance of the Burrows-
so that the data is intact and stored according to the original. Wheeler transform. The term “Punctured” comes from Error
The working principle of the Huffman algorithm is to encode Code Memory (ECC). ECC consists of the original data in
each character into a bit representation. The representation of addition to an array of numbers from check bits. Some check
bits for each character differs from one another based on the bits are omitted to shorten a series of codes
13592
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 23 (2017) pp. 13589-13595
© Research India Publications. http://www.ripublication.com
RECENT RESEARCH
In Table 1, we summarize the recent research of data
compression and cryptographic algorithm.
13593
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 23 (2017) pp. 13589-13595
© Research India Publications. http://www.ripublication.com
13594
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 23 (2017) pp. 13589-13595
© Research India Publications. http://www.ripublication.com
Algorithm," International Journal of Engineering and Data Approaching The Source Entropy Rate",
Innovative Technology (IJEIT), 2(6), pp. 362-365. Proceedings of 43rd Annual Allerton Conference on
Communication, Control and Computing, Allerton, IL,
[8] Mahajan, P., and Sachdeva A., 2013, "A Study of
pp. 1538-1547.
Encryption Algorithms AES, DES and RSA for
Security," Global Journal of Computer Science and
Technology Network, Web & Security, 13(15).
[9] Borda, M., 2011, "Fundamentals In Information Theory
and Coding," Springer-Verlag Berlin Heidelberg,
Romania, pp. 95.
[10] Shanmugasundaram, S., and Lourdusamy, R., 2011, "A
Comparative Study of Text Compression Algorithms,"
International Journal of Wisdom Based Computing,
1(3), pp. 68-76.
[11] Altarawneh, H., and Altarawneh, M., 2011, "Data
Compression Techniques on Text Files: A Comparison
Study," International Journal of Computer Applications,
26(5).
[12] Antil, R., and Gupta, S., 2014, "Analysis and
Comparison of Various Lossless Compression
Techniques," International Journal for Research in
Applied Science and Engineering Technology
(IJRASET), 2(3), pp. 251-262.
[13] Bodden, E., Clasen, M., and Kneis J., 2004, "Arithmetic
Coding Revealed," RWTH Aachen University, Aachen,
Germany.
[14] Howard, P. G., and Vitter J. S., 1992, "Analysis Of
Arithmetic Coding For Data Compression," Brown
University, Providence, RI.
[15] Fenwick, P., 1996, "Punctured Elias Code for Variable-
Length Coding of the Integers", Report no. 137, The
University of Auckland, Auckland.
13595