Perancangan Perangkat Lunak Kriptografi Menggunakan Gronsfeld Cipher, Vernam Cipher dan Ron Code 4 Stream Cipher
Abstract
The process of sending data is done as the internet media, and other media. Basically the data transmission without any security to the content of the data sent, so that when the tapping on the flow of the delivery of data that can be intercepted immediately read tappers. For that required software as a supporter using a particular method of encryption (cryptography) so that the messages contained in the data sent to be safe. The data collection techniques used in this study with literature study to obtain the theory of cryptography Gronsfeld Cipher, Vernam Cipher and Ron Code 4 Stream Cipher. While the software design method using RAD (Rapid Application Development) The design of software using Microsoft Visual Basic.Net programming language of this design resulted in a combined cryptosystem application Gronsfeld Cipher, Vernam Cipher and Ron Code 4 Stream Cipher. Combined cryptosystem software Gronsfeld Cipher, Vernam Cipher and Ron Code 4 Stream Cipher in the presence of this device, confidentiality and authenticity of information will be more awake
Keywords
Perangkat lunak kriptografi; Kriptosistem gabungan; Gronsfeld Cipher; Vernam Cipher dan Ron Code 4 Stream Cipher; Visual Basic.Net; Prototype;
Full Text:
PDFReferences
Azanuddin, Penyandian Short Message Service (SMS) Pada Telepon Selular Dengan Menggunakan Algoritma Gronsfeld, Pelita Informatika Budi Darma, Volume : IV, Nomor: 1, Agustus 2013 ISSN : 2301-9425
Khairani Puspita1, M. Rhifky Wayahdi2.,2015. Analisis Kombinasi Metode Caesar Cipher, Vernam Cipher, dan Hill Cipher dalam Proses Kriptografi , ISSN 2302-3805
Dwi Irfianti,Asti., ( 2007)., Metode Pengamanan Ekkripsi RC4 Stream Cipher Untuk Aplikasi Pelayanan Gangguan. ISSN : 1907-5022
Nazir, M. 2005. Metode Penelitian. Jakarta: Ghalia Indonesia
Sugiyono. 2012. Metode Penelitian Kombinasi (Mixed Methods). Bandung: Alfabeta
DOI: http://dx.doi.org/10.30700/.v2i1.931
Article Metrics
Abstract view : 377 timesPDF - 466 times
Refbacks
- There are currently no refbacks.