A. Abimanyu, Yuliansari N. Dwi, I. Mustika, Litasari
{"title":"Implementation of modified Vernam algorithm for radioactive transportation monitoring system","authors":"A. Abimanyu, Yuliansari N. Dwi, I. Mustika, Litasari","doi":"10.1109/EECCIS.2014.7003733","DOIUrl":null,"url":null,"abstract":"Safety and security aspects of radioactive substances from the sender to the receiver are important and should be assured. This research proposes implementation of modified Vernam algorithm to encrypt SMS which contains status information in transporting radioactive substances The results show that there are no errors in the process of data encryption and decryption as long as it uses the same key. In addition, the computational time required to perform encryption and decryption of 1 character is 0.83 ms. Using modified Vernam algorithm will increase the security level of data but must be paid with additional computing time and success rate depends on the similarity of randomly generated key.","PeriodicalId":230688,"journal":{"name":"2014 Electrical Power, Electronics, Communicatons, Control and Informatics Seminar (EECCIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Electrical Power, Electronics, Communicatons, Control and Informatics Seminar (EECCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EECCIS.2014.7003733","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Safety and security aspects of radioactive substances from the sender to the receiver are important and should be assured. This research proposes implementation of modified Vernam algorithm to encrypt SMS which contains status information in transporting radioactive substances The results show that there are no errors in the process of data encryption and decryption as long as it uses the same key. In addition, the computational time required to perform encryption and decryption of 1 character is 0.83 ms. Using modified Vernam algorithm will increase the security level of data but must be paid with additional computing time and success rate depends on the similarity of randomly generated key.