Implementasi Algoritma Elliptic Curve Cryptography (ECC) Untuk Penyandian Pesan Pada Aplikasi Chatting Client Server Berbasis Desktop
DOI:
https://doi.org/10.30865/jurikom.v6i4.1398Abstract
The problem of security on computers is the most important issue in the current era of information technology. Many cyber crimes that occur one of which is related to data manipulation on the network. The most important problem with computer security is the security of the data that is sent. Examples of data that really need to be secured are messages in chat applications. In addition to preventing information from being read by other parties, encoding of messages greatly enables the effectiveness of sending confidential information. One type of asymmetric algorithm that has 2 different keys for encryption and decryption in the method of hiding messages (Cryptography) where the sender of the message first uses the public key (public key) to encode the message, and to decrypt the encrypted message the recipient will use a secret key (private key ). The Elliptic Curve Cryptography algorithm is quite complicated in its calculations, because the calculations are different from ordinary calculations.
References
M. Zunaidi, B. Andika and S. , "Membentuk Jaringan PEER TO PEER Menggunakan Kabel FIREWIRE IEEE-1394 Dengan Metode Bridge," Jurnal Ilmiah SAINTIKOM, vol. 13, pp. 107-120, 2014.
E. B. Harjono and e. a. , Analisis Kripto Sistem Algoritma AES Dan Elliptic Curve Cryptography (ECC) Untuk Kemanan Data, Vols. Vol 1, No 2, 2017.
Logika Dan Algoritma, Surabaya: Politeknik Elektronik Negerei Surabaya, 2013.
D. Ariyus, Pengantar Ilmu Kriptografi, Teori, Analisis, Dan Implementasi, S. Suyanto, Penyunt., Yogyakarta: Andi, 2008.
A. J. Manezes dan e. a. , Handbook Of Applied Cryphtography, Newyork: CRC Press, 1996.
S. Nurhayani, "Implementasi Penggunaan Teknik Steganografi Metode LSB & Polybus Square Cipher pada Citra Digital," Vols. Vol 1, No 3.
Suprapto, Bahasa Pemograman, R. A. Avianti, Penyunt., Dapartemen Pendidikan Nasional, 2008.
Darmayuda Ketut, Pemograman Aplikasi Database Dengan Microsoft Visual Basic.Net 2008, Informatika, 2009.
Dony Ariyus, Pengantar Ilmu Kriptografi Teori Dan Analisis dan Implementasi, Yogyakarta, Andi Offset, 2008
Wahana Komputer, SQL Server 2102, Andi, 2013.



