Modification of the original message (plaintext) with the LCG random number generator algorithm and encryption with the affine cipher algorithm to produces a dynamic and safe random message (ciphertext) compared to just the affine cipher algorithm. The plaintext is converted to ASCII code and stored in a data list. The data list that contain the plaintext changes the position of the data where each plaintext column is moved to an odd column and even columns are filled by random numbers generated by LCG. The data list is then changed again by adding value to each column with random numbers generated by the programming language and then it encrypted with the affine cipher algorithm. The total number of ciphertexts can be twice as many as the plaintext. The results obtained are not the same ciphertext character even though the plaintext has the same character. Ciphertext generated in the first run program will be different for the next run program or dynamic encryption. To restore a ciphertext to the plaintext is done based on the affine cipher decryption function and the steps to modify the message that was done before.
Data Encryption Standard (DES) has a weakness in the key that is vulnerable to security threats, but it is quite popular to use because of the fast encryption and decryption process. Combining the DES algorithm with the Pseudo-random number generator Blum-Blum-Shub (BBS) in generating external keys in the encryption and decryption process of messages, produces a unique key and a good level of security. The longer the selected key and seed, the higher the security level of the DES encryption and decryption key. The use of BBS as an external key generator in the DES algorithm does not significantly affect the encryption (key and seed generated is around 0,001 – 0,003 seconds for the 2 – 4 digits experiment) processing time, meanwhile, the time in the decryption process has no effect because the BBS key and seed are no longer subject to feasibility testing or number requirements. The combination of DES and BBS algorithms can increase security in terms of encryption and decryption keys because the random number of DES keys generated by the BBS algorithm is unique and does not burden the user in determining the keys used in the DES algorithm because the keys are generated from the programming language.
Quality of Service (QoS) on Live Streaming has the main parameters, namely bandwidth, jitter, loss and delay, which are measured on the implementation of Wireless IP Camera based on Android Smartphone. The test tools used iperf and ping software, to capture data packets. The network design in this study uses Xonz Wireless IP Camera, wifi router, Server/Laptop and Android Smartphone to monitor or access the services provided. Surveillance/reconnaissance or surveillance by accessing live streaming can be done from anywhere as long as there is still an intranet network. wifi router provides DHCP service, Server/Laptop provides a Virtual Machine using MS Windows Server 2003 Operating System. Web Server is not installed on Real Machine but on Virtual Machine. The smartphone used has the Android Operating System version 4.4.2. IP Camera Xonz model XZ-12Z-HR/W has one major drawback that it can only be accessed via Internet Explorer Browser which can only run on MS Windows Operating System. Some applications that are already available on Google Play and installed on Android Smartphones cannot detect the Wireless IP Camera. The outcome or impact of this research is the creation of a simple Live Streaming application that can be accessed by all browsers on all platforms including Android Smartphones. Measurements were made using iperf and ping. The results showed that the Xonz IP Camera can still be used for mobile room monitoring as far as a maximum of about 20 m from the wifi router and still meets the standard QoS values set by TIPHON and ITU-T G.114.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.