Implementasi Algoritma RC4+ Dan IDEA Dalam Mengamankan Pesan Teks

Authors

  • Zulfadli Lubis Universitas Budi Darma, Medan
  • Chandra Frenki Sianturi Universitas Budi Darma, Medan

Keywords:

Cryptography, RC4 Algorithm, IDEA Algorithm, Text Messaging

Abstract

The existence of technology really helps human life in carrying out their various jobs. Technology makes humans not feel difficult, thus facilitating their work. A computer is a tool that is usually used to process data that contains information in confidential or non-confidential form based on predetermined standard rules. The information sent can be in the form of text, images, audio and video. Information in confidential form must be kept secure and authentic from parties who are not supposed to have the right to the information for personal or group gain. There are several ways that can be done to secure and maintain confidential information, one of which is information in the form of text messages. This study uses the RC4+ and IDEA algorithms to carry out the encryption and decryption process twice. A file containing a message will be encrypted using the RC4+ algorithm, then the ciphertext encrypted by the RC4+ algorithm will be re-encrypted using the IDEA algorithm, so that the contents of the ciphertext will be difficult to understand.

References

D. Iqbal, A. R. Panggabean, I. W. Sinaga dan T. Zebua, â€Implementasi Algoritma RC4+ Untuk Mengamankan Pesan Teks Pada Aplikasi Chattingâ€, SAINTEKS, pp.916-920, 2019

D. A. Meko †Perbandingan Algoritma DES, AES, IDEA Dan Blowfish dalam Enkripsi dan Dekripsi Dataâ€, Jurnal Teknologi Terpadu, Vol.4, pp.8- 15, 2018

J. Sasongko, “Pengamanan Data Informasi menggunakan Kriptografi Klasikâ€, Jurnal Teknologi Informasi Dinamik, vol. x, pp.160-167, 2005

M. Sholeh dan J.V. Hamokwarong,â€Aplikasi Kriptografi Dengan Metode Vernam Cipher dan Metode Permutasi Binerâ€, Momentum, vol. 7, pp.8-13, 2011

R. Watrianthos, “Perbandingan Teknik Kriptografi Metode SAPPHIRE II dan RC4â€, Jurnal Ilmiah AMIK Labuhan Batu, vol. 3, pp.17-40, 2015

A.A. Ibrahim, "Perancangan Pengamanan Data Menggunakan Algoritma AES (Advanced Encryption Standard)", Teknik Informatika STMIK Antar Bangsa, vol. III, pp.53-60, 2017

C. A. Sari, E. H. Rachmawanto, D. W. Utomo dan R. R. Sani, â€Penyembunyian Data Untuk Seluruh Ekstansi File Mengguanakan Kriptografi Vernam Cipher dan Bit Shiffing†Journal of Applied Intelligent System, vol.1, pp.179-190, 2016

N. Aleisa, “A Comparison of the 3DES and AES Encryption Standardsâ€, International Jurnal of Security and Its Applications, vol. 7, pp.241-246, 2015

Immersa-Lab, (2018,feb.13). Fungsi Hash Dalam Kriptografi [online]. Available:https://www. immersa-lab.com/fungsi-hash-dalam-kriptografi.html/

Wikipedia, (2020, Apr.15). Text Messaging [online]. Available:https://en.wikipedia.org/wiki/Text_messaging/

Downloads

Published

2023-02-28