Perancangan Aplikasi Terenkripsi Dengan Menerapkan Metode Secret Sharing Asmuth Bloom
DOI:
https://doi.org/10.30865/jurikom.v5i6.1211Abstract
Conventional cryptographic algorithms cannot be applied to solve a plaintext (message) into several ciphertext pieces because conventional cryptographic algorithms can only produce a ciphertext from a plaintext (message) In this case, cryptography can be applied, namely Asmuth-Bloom's secret sharing. The methodology used to analyze and design the Asmuth-Bloom secret sharing cryptographic application software is the Waterfall methodology. This research is intended to produce a learning software that is able to display work processes from Asmuth-Bloom's secret sharing and applications from Asmuth-Bloom's secret sharing. The working procedure described by the software includes the process of forming keys, the process of forming shadows and the process of combining shadow.
References
Jogiyanto, 2001, Analisis Dan Desain Sistem, penerbit andi, Yogyakarta.
Jogiyanto, 2003, Pengenelan Sistem Informasi, pnerbit andi, Yogyakarta.
Rinaldi Munir, 2006, Kriptografi, Informatika, 2006
Dafit, 2006, Kriptografi Kunci Simetris Menggunakan Crypton, Jurnal Ilmiah, Volume 2, Nomor. 3.)
Schneier, Bruce, 1996, Applied Cryptography, Second Edition : Protocol. Algorithm and Source Code in C, Jhon Wiley and Son, Inc.
Nugroho, Adi, 2010, Rekayasa Perangkat Lunak, Penerbit Andi Publishier, Yogyakarta.
Priyanto, Rahmat, 2009, Langsung Bisa Visual Basic.Net 2008, Penerbit Andi Publishier, Yogyakarta.
Jogiyanto, 2001, Analisis Dan Desain Sistem, penerbit andi, Yogyakarta.
Jogiyanto, 2003, Pengenelan Sistem Informasi, pnerbit andi, Yogyakarta.
Rinaldi Munir, 2006, Kriptografi, Informatika, 2006
Dafit, 2006, Kriptografi Kunci Simetris Menggunakan Crypton, Jurnal Ilmiah, Volume 2, Nomor. 3.)



