Rancangan Perangkat Lunak Kriptografi Menggunakan Algortima AES dan Transposisi Cipher

Marius Leonardi, I Dewa Ayu Eka Yuliani

Abstract


Influence Development of computer science has been touched in various fields, such as Security, Unsecure exchange of information increase chance vulnerability to access some information to be private or confidential is extremely harmful for users of information technology today. In the world of information,there are important data and confidential that should not be known by the public. Tapping on messages or information is very detrimental to current information technology users. Encryption is one way of protecting messages or confidential data safe from irresponsible which trying to steal the information. Therefore, it takes a strong cryptographic algorithms to maintain confidentiality and authenticity data. Advanced Encryption Standard (AES) is a modern cryptographic algorithms that are currently widely used to secure the data. AES (Advanced Encryption Standard) is a continuation of the standard encryption algorithms DES (Data Encryption Standard) that the validity period is deemed to have ended because of the safety factor. To improve the security then a combination of Transposition Cipher encryption with AES encryption that encodes again so that it becomes more powerfull rather than an encryption that don’t use a combination at all.


Keywords


Enkripsi; AES; Transposisi Cipher

Full Text:

PDF

References


Rifki Sadikin. 2012. Kriptografi Untuk Keamanan Jaringan. Yogyakarta:Andi

Dony Ariyus. 2008. Pengantar Ilmu Kriptografi. Jogjakarta,Indonesia: Penerbit Andi.

Kromodimoeljo, S. 2010. Teori dan Aplikasi Kriptografi.SPK IT Consulting.

A. S., Rosa dan Shalahuddin, M. 2013. Rekayasa Perangkat Lunak Terstruktur Dan Berorientasi Objek. Informatika. Bandung.

A. S., Rosa dan Shalahuddin, M. 2013. Rekayasa Perangkat Lunak Terstruktur Dan Berorientasi Objek. Informatika. Bandung.

Shalahudin, A.S. Rosa., 2013, Rekayasa Perangkat Lunak Terstruktur dan Berorientasi Objek, Penerbit Informatika, Bandung.




DOI: http://dx.doi.org/10.30700/.v1i1.927

Article Metrics

Abstract view : 0 times
PDF - 0 times