Perancangan Aplikasi Terenkripsi Dengan Menerapkan Metode Secret Sharing Asmuth Bloom

Authors

  • Evi Amelia Tarigan STMIK Budi Darma Jln. Sisingamangaraja No. 338

DOI:

https://doi.org/10.30865/jurikom.v5i6.1211

Abstract

Conventional cryptographic algorithms cannot be applied to solve a plaintext (message) into several ciphertext pieces because conventional cryptographic algorithms can only produce a ciphertext from a plaintext (message) In this case, cryptography can be applied, namely Asmuth-Bloom's secret sharing. The methodology used to analyze and design the Asmuth-Bloom secret sharing cryptographic application software is the Waterfall methodology. This research is intended to produce a learning software that is able to display work processes from Asmuth-Bloom's secret sharing and applications from Asmuth-Bloom's secret sharing. The working procedure described by the software includes the process of forming keys, the process of forming shadows and the process of combining shadow.

References

Jogiyanto, 2001, Analisis Dan Desain Sistem, penerbit andi, Yogyakarta.

Jogiyanto, 2003, Pengenelan Sistem Informasi, pnerbit andi, Yogyakarta.

Rinaldi Munir, 2006, Kriptografi, Informatika, 2006

Dafit, 2006, Kriptografi Kunci Simetris Menggunakan Crypton, Jurnal Ilmiah, Volume 2, Nomor. 3.)

Schneier, Bruce, 1996, Applied Cryptography, Second Edition : Protocol. Algorithm and Source Code in C, Jhon Wiley and Son, Inc.

Nugroho, Adi, 2010, Rekayasa Perangkat Lunak, Penerbit Andi Publishier, Yogyakarta.

Priyanto, Rahmat, 2009, Langsung Bisa Visual Basic.Net 2008, Penerbit Andi Publishier, Yogyakarta.

Jogiyanto, 2001, Analisis Dan Desain Sistem, penerbit andi, Yogyakarta.

Jogiyanto, 2003, Pengenelan Sistem Informasi, pnerbit andi, Yogyakarta.

Rinaldi Munir, 2006, Kriptografi, Informatika, 2006

Dafit, 2006, Kriptografi Kunci Simetris Menggunakan Crypton, Jurnal Ilmiah, Volume 2, Nomor. 3.)

Additional Files

Published

2018-12-19

How to Cite

Tarigan, E. A. (2018). Perancangan Aplikasi Terenkripsi Dengan Menerapkan Metode Secret Sharing Asmuth Bloom. JURNAL RISET KOMPUTER (JURIKOM), 5(6), 648–652. https://doi.org/10.30865/jurikom.v5i6.1211