Penyandian File Word Berdasarkan Algoritma Rivest Code 5 (RC5)
(1) STMIK Budidarma Medan
(2) STMIK Budidarma Medan
(3) STMIK Budidarma Medan
(*) Corresponding Author
Abstract
Nowadays, important data in the form of word files have been widely used. But there are still few who apply security techniques to the important files. Files that are confidential or important, if they fall into the hands of others may be misused or manipulated for certain purposes. The existence of document security applications built on cryptographic algorithms is one solution to solve the above problems. Cryptographic techniques secure a data or important files by encoding the data into a cipher that is difficult to understand again by others. The RC5 algorithm is one of the cryptographic technique algorithms that can be used to encode text from word files based on the RC5 algorithm so that it can improve the expression of important and confidential word files.
Full Text:
PDFReferences
S.H. Suryawan, Hamdani, "Pengamanan Data File Dengan Menggunakan Algoritma Enkripsi Rivest Code 5 ," Jurnal Informatika Mulawarman , vol.8, no. 2, pp. 44-49, 2013.
E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab, Yogyakarta:Andi, 2015.
T. Zebua and E. Ndruru, “PENGAMANAN CITRA DIGITAL BERDASARKAN MODIFIKASI ALGORITMA RC4,” J. Teknol. Infomasi dan Ilmu Komput., vol. 4, no. 4, pp. 275–282, 2017.
E. Setyaningsih, “Penyandian Citra Menggunakan Metode Playfair Cipher”,J. Teknol., vol. 2, no. 2, pp. 213–219, 2009.
Hamdani, S.H. Suryawan, A. Septiarini,"Pengujian Algoritma Rivest Code 5 Untuk Enkripsi Struktur File Dokumen," Jurnal Informatika Mulawarman, vol. Vol. 8 No. 2, pp. 44-49, Juni 2013.
E. Aribowo, “Aplikasi Pengamanan Dokumen Office Dengan Algoritma Kriptografi Kunci Asimetris Elgamal,” J. Inform., vol. 2, no. 2, pp. 209–219, 2008.
R. Sadikin, 2012, Kriptografi Untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java, Yogyakarta, Andi.
H. Pandiangan, S. Sijabat "PERANCANGAN MEDIA PENGIRIMAN PESAN TEKS DENGAN PENYANDIAN PESAN MENGGUNAKAN ALGORITMA RC4 BERBASIS WEB ," Jurnal Matik Penusa , vol. Volume XIX, No. 1 , no. ISSN 2088-3943 , pp. 63-71, Juni 2016
T. Zebua, “ANALISA DAN IMPLEMENTASI ALGORITMA TRIANGLE CHAIN PADA PENYANDIAN RECORD DATABASE,” Pelita Inform. Budi Darma, vol. 3, no. 2, pp. 37–49, 2013.
N. Widyastuti, “Pengembangan Metode Beaufort Cipher Menggunakan Pembangkit Kunci Chaos,” J. Teknol., vol. 7, no. 1, pp. 73–82, 2014.
DOI: http://dx.doi.org/10.30645/j-sakti.v2i1.55
Refbacks
- There are currently no refbacks.
J-SAKTI (Jurnal Sains Komputer & Informatika)
Published Papers Indexed/Abstracted By:
Jumlah Kunjungan :