Implementation of the Asymmetric Fountain Code Algorithm to Secure Aviation Licensing and Regulatory Document Data

Authors

  • Daniel D Rumani Akademi Penerbang Indonesia

DOI:

https://doi.org/10.61306/jitcse.v1iS1.17

Keywords:

Cryptography, Data Security, Fountain Code Algorithm

Abstract

Several agencies, both government and private, require the security of personal data, especially as this information can only be accessed or transmitted to authorized people or organizations. Likewise with license and regulatory records, these materials are exceedingly confidential. Documents pertaining to permissions and regulations issued by aviation authorities, such as operating permits and aircraft certification, However, the difficulty is that when data is distributed using an internet connection, it can slip into the hands of unscrupulous people. Implementation of the Asymmetric Fountain Code Algorithm to safeguard confidential text data is used to safeguard license and regulatory document data with encryption and description methods using the Fountain Code Algorithm, which has two keys to access plaintext and ciphertext documents using SharpDevelop 5.1 software in the C# language. This research reveals that the outputs of the Fountain Code algorithm can restore plaintext data in its entirety. So it can be inferred that the asymmetric Fountain Code algorithm meets good data integrity and is safe; the complexity of the algorithm is simpler; and the amount of plaintext is exactly related to time.

References

W. W. Widiyanto, D. Iskandar, S. Wulandari, E. Susena, and E. Susanto, “Implementation Security Digital Signature Using Rivest Shamir Adleman (RSA) Algorithm As A Letter Validation And Distribution Validation System,” in 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), 2022, pp. 599–605. DOI: https://doi.org/10.1109/IIHC55949.2022.10060839

N. P. Douglass, J. Langel, W. J. Moore, L. Ng, R. M. Dudukovich, and S. Mal-Sarkar, “Application of Fountain Code to High-rate Delay Tolerant Networks,” IEEE Access, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3315659

J. Juhari and M. F. Andrean, “On the application of noiseless steganography and elliptic curves cryptography digital signature algorithm methods in securing text messages,” CAUCHY J. Mat. Murni dan Apl., vol. 7, no. 3, pp. 483–492, 2022. DOI: https://doi.org/10.18860/ca.v7i3.17358

A. Hamza and B. Kumar, “A review paper on DES, AES, RSA encryption standards,” in 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), 2020, pp. 333–338. DOI: https://doi.org/10.1109/SMART50582.2020.9336800

J. Jamaludin and R. Romindo, “Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security,” IJISTECH (International J. Inf. Syst. Technol., vol. 4, no. 1, pp. 471–481, 2020.

K. N. Jassim et al., “Hybrid cryptography and steganography method to embed encrypted text message within image,” in Journal of Physics: Conference Series, 2019, vol. 1339, no. 1, p. 12061. DOI: https://doi.org/10.1088/1742-6596/1339/1/012061

D. Y. SYLFANIA, F. P. JUNIAWAN, and H. A. PRADANA, “Blowfish–RSA Comparison Analysis of the Encrypt Decrypt Process in Android-Based Email Application,” in Sriwijaya International Conference on Information Technology and Its Applications (SICONIAN 2019), 2020, pp. 113–119. DOI: https://doi.org/10.2991/aisr.k.200424.017

M. Nurullaev and R. D. ALOEV, “Software, algorithms and methods of data encryption based on national standards,” IIUM Eng. J., vol. 21, no. 1, pp. 142–166, 2020. DOI: https://doi.org/10.31436/iiumej.v21i1.1179

A. Tidrea, A. Korodi, and I. Silea, “Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems,” Sensors, vol. 23, no. 5, p. 2686, 2023. DOI: https://doi.org/10.3390/s23052686

S. S. Roy and U. Banerjee, “Preventing a Cryptoapocalypse: From mathematics to circuits for postquantum cryptography,” IEEE Solid-State Circuits Mag., vol. 15, no. 1, pp. 38–44, 2023. DOI: https://doi.org/10.1109/MSSC.2022.3221692

S. Ullah, J. Zheng, N. Din, M. T. Hussain, F. Ullah, and M. Yousaf, “Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey,” Comput. Sci. Rev., vol. 47, p. 100530, 2023. DOI: https://doi.org/10.1016/j.cosrev.2022.100530

Q. Zhang, X. Li, M. Yang, Y. Liu, and H. Zhang, “Adaptive Space-Time Short-Frame Fountain Code With Plasma Sheath Channel,” IEEE Trans. Plasma Sci., 2023. DOI: https://doi.org/10.1109/TPS.2023.3276974

L. Laouamer, M. Al Shaikh, L. T. Nana, and A. C. Pascu, “Informed symmetric encryption algorithm for DICOM medical image based on N-grams,” in 2013 Science and Information Conference, 2013, pp. 353–357.

H. Nie, X. Jiang, W. Tang, S. Zhang, and W. Dou, “Data security over wireless transmission for enterprise multimedia security with fountain codes,” Multimed. Tools Appl., vol. 79, pp. 10781–10803, 2020. DOI: https://doi.org/10.1007/s11042-019-08479-z

Z. Qin, J. Huang, and Z. Fei, “Improved HTLO Algorithm for On-Line Fountain Codes with Limited Feedback,” in 2021 IEEE Wireless Communications and Networking Conference (WCNC), 2021, pp. 1–6. DOI: https://doi.org/10.1109/WCNC49053.2021.9417600

Y. Xue, Z. Sun, Z. Liang, C. Fan, and X. Xu, “Data collection method of space-based internet of things based on layered fountain code,” in 2020 IEEE 6th International Conference on Computer and Communications (ICCC), 2020, pp. 2475–2479. DOI: https://doi.org/10.1109/ICCC51575.2020.9345266

Z. Zheng, L. Yuan, and F. Fang, “Performance analysis of fountain coded non-orthogonal multiple access with finite blocklength,” IEEE Wirel. Commun. Lett., vol. 10, no. 8, pp. 1752–1756, 2021. DOI: https://doi.org/10.1109/LWC.2021.3078811

H. Shi, J. Lei, J. Tu, and G. Qiu, “An Optimized Algorithm on the Design of Degree Distribution for Fountain Code based on Physical Layer Security,” in Proceedings of the 2020 4th International Conference on Electronic Information Technology and Computer Engineering, 2020, pp. 44–49. DOI: https://doi.org/10.1145/3443467.3443727

G. Joshi, J. B. Rhim, J. Sun, and D. Wang, “Fountain codes,” in Global telecommunications conference (GLOBECOM 2010), 2010, pp. 7–12.

M. Hu, W. Li, F. Yu, and X. Hu, “The Fountain-codes-based Encryption and Decryption Algorithm Research,” in 2017 2nd International Conference on Control, Automation and Artificial Intelligence (CAAI 2017), 2017, pp. 386–389. DOI: https://doi.org/10.2991/caai-17.2017.88

Y. Yang and X. Jiang, “A selective enhancement degree and non-uniform selection encoding algorithm for digital fountain code,” in 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA), 2020, pp. 389–393. DOI: https://doi.org/10.1109/AEECA49918.2020.9213502

W. J. Lim, R. Abbas, Y. Li, B. Vucetic, and M. Shirvanimoghaddam, “Analysis and design of analog fountain codes for short packet communications,” IEEE Trans. Veh. Technol., vol. 70, no. 12, pp. 12662–12674, 2021. DOI: https://doi.org/10.1109/TVT.2021.3118792

J. Singh, A. Banerjee, and H. Sadjadpour, “Secure and private fountain code based architecture for blockchains,” in 2022 IEEE Wireless Communications and Networking Conference (WCNC), 2022, pp. 1521–1526. DOI: https://doi.org/10.1109/WCNC51071.2022.9771862

J. Qureshi and C. H. Foh, “Triangular code: Near-optimal linear time fountain code,” Digit. Commun. Networks, vol. 9, no. 4, pp. 869–878, 2023. DOI: https://doi.org/10.1016/j.dcan.2022.12.006

Downloads

Published

2024-04-01

How to Cite

Daniel D Rumani. (2024). Implementation of the Asymmetric Fountain Code Algorithm to Secure Aviation Licensing and Regulatory Document Data. Journal of Information Technology, Computer Science and Electrical Engineering, 1(S1), 35–40. https://doi.org/10.61306/jitcse.v1iS1.17