Analisis Keamanan Pesan Text Menggunakan Kriptografi Hybrid CBC dan RC 4
Abstract
Keywords
Full Text:
PDFReferences
M. Danuri, “Development and transformation of digital technology,” Infokam, vol. XV, no. II, pp. 116–123, 2019.
K. Nassif Jassim et al., “Hybrid cryptography and steganography method to embed encrypted text message within image,” in Journal of Physics: Conference Series, 2019, vol. 1339, no. 1, doi: 10.1088/1742-6596/1339/1/012061.
D. D. A. Yani, H. S. Pratiwi, and H. Muhardi, “Implementasi Web Scraping untuk Pengambilan Data pada Situs Marketplace,” J. Sist. dan Teknol. Inf., vol. 7, no. 4, p. 257, 2019, doi: 10.26418/justin.v7i4.30930.
F. Cochoy, C. Licoppe, M. P. McIntyre, and N. Sörum, “Digitalizing consumer society: equipment and devices of digital consumption,” J. Cult. Econ., vol. 13, no. 1, pp. 1–11, 2020, doi: 10.1080/17530350.2019.1702576.
J. Rengamani, F. A. James, R. Srinivasan, S. Poongavanam, and R. Vettriselvan, “Impact on the usage of electronic data interchange (EDI) on the international shipping business in Chennai,” Int. J. Eng. Adv. Technol., vol. 8, no. 2, pp. 418–422, 2019.
K. Thakur, T. Hayajneh, and J. Tseng, “Cyber Security in Social Media: Challenges and the Way Forward,” IT Prof., vol. 21, no. 2, pp. 41–49, 2019, doi: 10.1109/MITP.2018.2881373.
O. K. Sulaiman, K. Nasution, and S. Y. Prayogi, “Enkripsi Surat Elektronik Menggunakan Metode XXTEA,” Comput. Eng. Sci. Syst. J., vol. 4, no. 1, p. 99, 2019, doi: 10.24114/cess.v4i1.12354.
F. A, F. Yanto, I. Iskandar, and Pizaini, “Jurnal Computer Science and Information Technology ( CoSciTech ) Kombinasi algoritma kriptografi vigenere cipher dengan metode zig-zag dalam pengamanan pesan teks,” vol. 4, no. 1, pp. 182–192, 2023, doi: https://doi.org/10.37859/coscitech.v4i1.4787.
S. N. Siregar, “Pengamanan Pesan Teks Menggunakan Algoritma FEAL dan RSA Pada Aplikasi Android,” J. Comput. Syst. Informatics …, vol. 1, no. 4, pp. 328–336, 2020, [Online]. Available: https://ejurnal.seminar-id.com/index.php/josyc/article/view/351.
F. Nova Hulu, M. Putri, and K. Kunci, “Metode Analitis Enkripsi Dan Dekripsi Dengan Penerapan Algoritma Kriptografi Klasik Ke Dalam Cipher,” J. Elektro dan Telkomunikasi, pp. 26–34, 2022.
E. Sutanty, M. B. Siregar, and E. Setiyaningsih, “Implementasi Feistel Block Cipher Dalam Enkripsi File Berbentuk Teks,” J. Ilm. Inform. Komput., vol. 26, no. 2, pp. 136–148, 2021, doi: 10.35760/ik.2021.v26i2.4238.
R. Munir, “IF4020 Kriptografi - Semester I Tahun 2021/2022,” https://informatika.stei.itb.ac.id/~rinaldi.munir/Kriptografi/2021-2022/kripto21-22.htm, 2021. https://informatika.stei.itb.ac.id/~rinaldi.munir/Kriptografi/2021-2022/kripto21-22.htm (accessed Oct. 21, 2022).
N. R. D. P. Astuti, I. Arfiani, and E. Aribowo, “Analysis of the security level of modified CBC algorithm cryptography using avalanche effect,” IOP Conf. Ser. Mater. Sci. Eng., vol. 674, no. 1, 2019, doi: 10.1088/1757-899X/674/1/012056.
A. F. Doni, O. A. H. Maria, and S. Hanif, “Implementation of RC4 Cryptography Algorithm for Data File Security,” J. Phys. Conf. Ser., vol. 1569, no. 2, pp. 2–8, 2020, doi: 10.1088/1742-6596/1569/2/022080.
R. Mohammed and L. M. Jawad, "Secure Image Encryption Scheme Using Chaotic Maps and RC4 Algorithm," Solid State Technology, vol. 63, no. 3, pp. 3450-3465, Nov. 2020
K. N. Suryani, “Algoritma Rc4 Sebagai Metode Enkripsi,” Enkripsi, vol. 4, p. 5, 2009.
S. Purba, “Kriptanalisis Kunci Publik Algoritma Rabin Menggunakan Metode Kraitchik,” Jurnal Sains dan teknologi, vol. 11, no. 2. pp. 205–213, 2019, [Online]. Available: https://ejurnal.istp.ac.id/index.php/jsti/article/view/25.
M. Karuppiah, S. Ramanujam, and A. Professor, “Designing an algorithm with high Avalanche Effect,” IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 11, no. 1, p. 106, 2011, [Online]. Available: https://www.researchgate.net/publication/266468045.
S. Suhandinata, R. A. Rizal, D. O. Wijaya, P. Warren, and S. Srinjiwi, “ANALISIS PERFORMA KRIPTOGRAFI HYBRID ALGORITMA BLOWFISH DAN ALGORITMA RSA,” JURTEKSI (Jurnal Teknol. dan Sist. Informasi), vol. 6, no. 1, pp. 1–10, 2019, doi: 10.33330/jurteksi.v6i1.395.
J. Jamaludin and R. Romindo, “Rancang Bangun Pengamanan Teks Menggunakan Kombinasi Vigenere Cipher dan RSA dalam Hybrid Cryptosystem,” Pros. Semin. Nas. Ris. …, vol. 2, pp. 105–116, 2020, [Online]. Available: http://tunasbangsa.ac.id/seminar/index.php/senaris/article/view/150/0.
K. Mohamed, “Analyse On Avalanche Effect In Cryptography Algorithm,” in Proceedings of the International Conference on Sustainable Practices, Development and Urbanisation (IConsPADU 2021), 16 November 2021, Universiti Selangor (UNISEL), Malaysia, Oct. 2022, vol. 3, pp. 610–618, doi: 10.15405/epms.2022.10.57.
DOI: http://dx.doi.org/10.12928/jstie.v12i2.26334
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Aslamadin Alvian Haz, Mushlihudin Mushlihudin
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Jurnal Sarjana Teknik Informatika
Organized by Informatics Department
Published by Universitas Ahmad Dahlan
Website: http://journal.uad.ac.id/index.php/JSTIF
Office: Industrial Technology Faculty, Kampus Utama UAD Jalan Ahmad Yani (Ringroad Selatan), Tamanan, Banguntapan, Bantul, Yogyakarta 55166, Indonesia
Email: herman.yuliansyah@tif.uad.ac.id || jurnalsarjana@tif.uad.ac.id
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.