Analisis Pengaplikasian Linear Congruential Generator (LCG) pada mode Cipher Block Chaining (CBC) Advanced Encryption Standard (AES)

  • Manovri Yeni Universitas Muhammadiyah Aceh
  • Rosyidah Siregar Universitas Harapan Medan
  • Tommy Tommy Universitas Harapan Medan
Keywords: LCG, CBC, AES, Chi-Square, Entropy


The use of the Linear Congruential Generator (LCG) as a part of the Cipher Block Chaining (CBC) method in the Advanced Encryption Standard (AES) has been a focus of international research to enhance data security. In this experiment, chi-square analysis and entropy analysis are employed to evaluate the effectiveness of applying LCG to CBC-AES compared to conventional CBC-AES. The chi-square analysis indicates the highest improvement of 15.1098 and the lowest decrease of -10.4293. This improvement reflects an enhancement in the probability distribution of encrypted data, approaching a random distribution, and indicates a reduced likelihood of statistical attacks on the encrypted data. Meanwhile, the entropy analysis shows the highest increase of 0.3562 and the lowest decrease of -0.0942. This increase suggests that data encrypted using this method becomes more difficult to predict or analyze by unauthorized parties, increasing the unpredictability of the encrypted data. The research results demonstrate a significant improvement in data security, with a 3.65% increase in chi-square analysis, indicating a more even probability distribution of data, and a 0.066% increase in entropy analysis, indicating higher unpredictability in encrypted data. These findings are promising and indicate the potential of LCG in enhancing cryptographic system security, although further research is needed for validation and optimization of this method in the context of information security.


Download data is not yet available.


[1] M. E. Hameed, M. M. Ibrahim, N. Abd Manap dan A. A. Mohammed, “A lossless compression and encryption mechanism for remote monitoring of ECG data using Huffman coding and CBC-AES,” Future generation computer systems, vol. 111, pp. 829-840, 2020.
[2] S. W. Lee dan K. B. Sim, “Design and hardware implementation of a simplified DAG-based blockchain and new AES-CBC algorithm for IoT security,” Electronics, vol. 10, no. 9, p. 1127, 2021.
[3] M. Gjorgjievska Perusheska, H. Mihajloska Trpcheska dan V. Dimitrova, “Deep Learning-based Cryptanalysis of Different AES Modes of Operation,” dalam Future of Information and Communication Conference, 2022.
[4] A. Al-Sabaawi, “Cryptanalysis of Block Cipher: Method Implementation,” dalam 2022 International Conference for Advancement in Technology (ICONAT), 2022.
[5] Qiao, K., Cheng, J. dan Ou, C., “A New Mixture Differential Cryptanalysis on Round-Reduced AES,” Mathematics, vol. 10, no. 24, p. 4736, 2022.
[6] Fujita, R., Isobe, T. dan Minematsu, K., “ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files?,” dalam Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, 2020.
[7] Hameed, M. E., Ibrahim, M. M., Abd Manap, N. dan Attiah, M. L., “Comparative study of several operation modes of AES algorithm for encryption ECG biomedical signal,” International Journal of Electrical and Computer Engineering, vol. 9, no. 6, p. 4850, 2019.
[8] El Hanouti, I., El Fadili, H. dan Zenkouar, K., “Cryptanalysis of an embedded systems’ image encryption,” Multimedia Tools and Applications, vol. 80, no. 9, pp. 13801-13820, 2021.
[9] O. S. Faragallah, El-sayed, H. S., Afifi, A. dan El-Zoghdy, S. F., “Small details gray scale image encryption using RC6 block cipher,” Wireless Personal Communications, vol. 118, pp. 1559-1589, 2021.
[10] Boke, A. K., Nakhate, S. dan Rajawat, A., “Efficient key generation techniques for securing IoT communication protocols,” IETE Technical Review, vol. 38, no. 3, pp. 282-293, 2021.
[11] Chen, R. W., Hong, Y. Y. dan Hsu, C. Y., “Perturbative Bit Flip: A New Twist to CBC Mode Attacks,” Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS), pp. 107-119, 2019.
[12] Moniruzzaman, A. B. M. dan Razzaque, M. A., “Enhancing the Security of AES-128 with Block Shuffling,” Proceedings of the 2nd International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), pp. 1-6, 2020.
[13] Alshaikh, S., Almesaeed, M. H. dan Aljoumaa, H. A., “Enhancing Data Security in Cloud Computing Using Block Shuffling Technique,” International Journal of Computer Applications, vol. 975, p. 8887, 2019.
[14] Chakraborty, R. dan Mandal, J. K., “An FPGA based cascaded CBC block cipher through RPSPNC and TE,” Microsystem Technologies, vol. 25, no. 5, pp. 1669-1677, 2019.
[15] G. Thoms, R. Muresan dan A. Al-Dweik, “Design of chaotic block cipher operation mode for intelligent transportation systems,” dalam 2019 IEEE International Conference on Consumer Electronics (ICCE), 2019.
[16] Muttaqin, K. dan Rahmadoni, J., “Analysis and design of file security system AES (advanced encryption standard) cryptography based,” Journal of Applied Engineering and Technological Science (JAETS), vol. 1, no. 2, pp. 113-123, 2020.
[17] Sudrajat, A., Prasetyo, Y. H. dan Kusumawardani, M., “Implementasi Enkripsi Advanced Encryption Standard (AES-128) Mode Cipher Block Chaining (CBC) sebagai Keamanan Komunikasi Pergerakan Robot Humanoid KRSBI,” Journal of Telecommunication Network (Jurnal Jaringan Telekomunikasi), vol. 11, no. 1, pp. 6-11, 2021.
[18] Assafli, H. T. dan Hashim, I. A., “Security enhancement of AES-CBC and its performance evaluation using the Avalanche effect,” dalam 2020 3rd International Conference on Engineering Technology and its Applications (IICETA), 2020.
[19] Makmur, F., Daniawan, B. dan Wijaya, A., “The Analysis and Design Computerized Semester Exams by Randomization Order of The Questions with Linear Congruential Generator Methods (Study Case: Agathos Vocational High School),” bit-Tech, vol. 1, no. 3, pp. 161-204, 2019.
[20] Pradhan, D., Som, S. dan Rana, A., “Cryptography encryption technique using circular bit rotation in binary field,” dalam 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), 2020.
How to Cite
Yeni, M., Siregar, R., & Tommy, T. (2023, September 30). Analisis Pengaplikasian Linear Congruential Generator (LCG) pada mode Cipher Block Chaining (CBC) Advanced Encryption Standard (AES). JiTEKH, 11(2), 105-113.

Most read articles by the same author(s)