Pengamanan Data File Teks (Word) Menggunakan Algoritma RC4
DOI:
https://doi.org/10.30865/json.v1i2.1745Keywords:
RC4 Algorithm, Cryptography, Encryption, DecryptionAbstract
Data security on computers can provide a protection for our data. Cryptographic techniques are very important techniques in securing data. Cryptography is the science of encryption techniques where the "original text" (plaintext) is encrypted using an encryption key into "random text that is difficult to read" (ciphertext) by someone who does not have a decryption key, one of the modern cryptographic methods developed is the RC4 algorithm. RC4 algorithm (Ron’s Code / Rivest’s Cipher) is one algorithm that can be used to encrypt data so that the original data can only be read by someone who has the encryption key.
References
M. Syahril and H. Jaya, “Aplikasi Steganografi Pengamanan Data Nasabah di Standard Chartered Bank Menggunakan Metode Least Significant Bit dan RC4,†Semin. Nas. Sains Teknol. Inf., pp. 505–509, 2019.
A. P. Sutiono, “Algoritma RC4 sebagai Perkembangan Metode Kriptografi,†Bandung Inst. Teknol. Bandung, pp. 1–6, 2011.
R. T. Jurnal, “Penerapan Algoritma Rivert Code 4 (Rc 4) Pada Aplikasi Kriptografi Dokumen,†Petir, vol. 11, no. 1, pp. 38–47, 2018, doi: 10.33322/petir.v11i1.6.
J. Pseudocode, S. Informasi, U. M. Bengkulu, and H. Cipta, “Implementasi Algoritma Rc4,†vol. V, 2018.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).

