Penerapan Kunci Berupa Gambar Pada Algoritma Vernam Cipher Dalam Perancangan Perangkat Lunak Kriptografi
Abstract
Data security is one of the important issues in the development of information technology today. One way that can be done to maintain data security is to use cryptography. Cryptography process is done by doing the data randomization process, so that the original file is not easy to read by unauthorized parties. Vernam Cipher method is a key symmetric key algorithm that is used to perform encryption and decryption using the same key. In the encryption process, Vernam Cipher algorithm uses the stream cipher method where the cipher comes from the XOR result between the plaintext bit and the bit key, while the binary permutation is done by reversing the binary code on each character. In this paper will be discussed, software programs that can perform cryptographic processes on a text inputted by the user. Cryptographic process consisting of encryption and decryption will use Vernam Cipher method and binary permutation method. The program is developed using java.
Keywords
Full Text:
PDFReferences
. Christy Atika Sari, Eko Hari Rachmawanto, Danang Wahyu Utomo, Ramadhan Rakhmat Sani, 2016. Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting, Jurnal Jurusan Teknik Informatika, Universitas Dian Nuswantoro. Vol. 1 No.3.
. Enterprise, J.2010. Belajar Sendiri CorelDraw X5. Elex Media Komputindo.Jakarta
. Enterprise, J.2016. Pengenalan HTML dan CSS. Elex Media Komputindo.Jakarta
. Sugiyono, 2008:407. Metode Penelitian Kunatitatif Kualitatif dan R&D. Bandung Alfabeta.
. Pressman, Roger S., “Rekayasa Perangkat Lunak: pendekatan praktisi (Buku 1)”, Andi, Yogyakarta, 2002.
DOI: http://dx.doi.org/10.30700/.v2i1.843
Article Metrics
Abstract view : 0 timesPDF - 0 times