Implementasi Hill Cipher Pada Kode Telepon dan Five Modulus Method dalam Mengamankan Pesan
Abstract
Keywords
Full Text:
PDF (Indonesian)References
Dony Ariyus, 2008, Pengantar Ilmu Kriptografi: Teori Analisis & Implementasi, Andi Offset.
Swain G. and Lanka S. K., 2012, A Quick review of Network Security and Steganography, International Journal of Electronics and Computer Science Engineering, vol. 1, no. 2, pp.426-435.
Wang H and Wang S., 2004, Cyber warfare: Steganography vs. Steganalysis, Communications of the ACM, vol. 47, no. 10..
Qazi, F., Khan, F.H., Agha, D.S., Khan, S.A., Rehman, S.U., 2019, Modification in Hill Cipher For Crtptogtraphic Application, 3C Tecnologia. Glosas de Innovacion aplicadas a la pyme, ISSN: 2254-4143.
Prasad, MG. V., Sundarayya, P., 2016, Generalized Self-Invertiblekey Generation Algorithm by using Reflection Matrix in Hill Cipher and Affine Hill Cipher, International journal of pharmacy & Technology. ISSN; 0975-766X.
Jassim, F. A., 2013, A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method, International Journal of Computer Applications, Volume 72 No. 17.
Alkadi, I., Robert, S., 2017, Application and Implementation of Secure Hybrid Steganography Algorithm in Private Cloud Platform. Journal of Computer Science Application and Information Technology. DOI: http://dx.doi.org/10.15226/2474-9257/2/2/00105.
Ariyus, D., Ardiansyah., 2019, Optimization Substitution Cipher and Hidden Plaintext in Image Data Using LSB Method, Journal of Phisics: Conference Series, Volume 1201.
Qasem, M.H., Qatawneh, M., 2018, Parallel Hill Cipher Encryption Algoritm, Inetrnational Journal of Computer Application, Volume 179, No. 19.
Joshi, K., 2018, A New Approach of Text Steganography Using ASCII Values, International Journal of Engineering Research & Technology (IJERT), Vol. 7 Issue 5.
S. Yunita, P. Hasan, and D. Ariyus, 2019, Modifikasi Algoritma Hill Cipher dan Twofish Menggunakan Kode Wilayah Telepon, Sisfotenika, vol. 9, no. 2, pp. 213–224.
Jane Irma Sari, Sulindawaty, Hengki Tamando Sihotang, 2017, Implementasi Penyembunyian Pesan Pada Citra Digital dengan Menggabungkan Algoritma Hill Cipher dan Metode Least Significant BIT (LSB), Jurnal Mantik Penusa, Volume 1 No 2 Desember 2017
Forouzan, Behrouz, 2006, Cryptography and Network Security, McGraw-Hill.
Kaharuddin, E. Pawan, and D. Ariyus, 2019, Kombinasi Arnold Cat Map dan Modifikasi Hill Cipher Menggunakan Kode Bunyi Beep BIOS PHOENIX, Sisfotenika, vol. 9, no. 2, pp. 159–168.
DOI: http://dx.doi.org/10.30700/jst.v10i1.521
Article Metrics
Abstract view : 133159 timesPDF (Indonesian) - 475 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2020 SISFOTENIKA
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Badan Pengelola Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (SISFOTENIKA) STMIK Pontianak.
Jurnal Ilmiah SISFOTENIKA terindex di :
| |
SERTIFIKAT PENGHARGAAN :
Jurnal Ilmiah SISFOTENIKA Terakreditasi Peringkat Empat
Partners & Co-Organizers:
Jurnal Ilmiah SISFOTENIKA: STMIK Pontianak Online Journal ISSN Printed (2087-7897) - ISSN Online (2460-5344) licensed under a Lisensi Creative Commons Atribusi 4.0 Internasional.