Pengamanan Pesan Teks E-Mail Menggunakan Metode Algoritma Bifid Dan Feedback Cipher

 (*)Siska Wulandari Mail (STMIK Budi Darma, Indonesia)

(*) Corresponding Author

DOI: http://dx.doi.org/10.30865/jurikom.v6i5.1646

Abstract

One of the most widely used internet applications is electronic message sending, called e-mail. As time goes by, sending messages via e-mail becomes one of the important things. But there are some threats that do not know when using e-mails such as eavesdropping on e-mail contents, changing e-mail contents by unauthorized people and making e-mails no longer authentic. The technique of securing text messages or data is known as cryptography. In cryptography there are several methods that are quite important in securing data, to maintain data confidentiality one of which is encryption (coding). Decryption (original text) of one of the cryptographic algorithms, namely bifid cipher and feedbak cipher. Bifid cipher was first discovered by Felix Delastelle in 1901. Bifid cioher encrypts by randomizing the position of the row and column of letters in the message that corresponds to the 5X5 square key board while the Cipher Feedback Method uses the Shift Register system, which is processed first is the Initialization Vector in the Encryption with Key algorithm. After processing, the resulting bits will go through a bit selection process, usually the leftmost bits, then encrypted with Plaintext to produce the Ciphertext. By applying a combination of the two algorithms, the bifid cipher algorithm and the feedback cipher, it is expected that the message sent in the e-mail will be coded so that unauthorized parties do not know the meaning of the message being sent. And can maintain the authenticity of the messages sent

Full Text:

PDF


Article Metrics

Abstract view : 144 times
PDF - 17 times

References

A.S. Permata, "Studi Penggabungan Metode Bifid Cipher pada Algoritma Playfair," ITB, pp. 1-6, 2010.

S.Sansani, "Penerapan Mode Blok Cipher CFB pada Yahoo Messenger," ITB, pp. 1-7, 2010.

D. Ariyus, Pengantar Ilmu Kriptografi: Teori Analisis Dan Implementasi. Yogyakarta : Andi, 2008.

A. Zaki, Trik Mengamankan Komputer untuk Pemula. Jakarta: Alex Media Komputindo, 2009.

R.Munir, Matematika Diskrit. Bandung: Informatika, 2007.

A. Kadir, Pengenalan Algoritma Pendekatan Secara Visual dan Interaktif Menggunakan RAPTOR. Yogyakarta: Andy, 2013.

A. Nugroho, Rekayasa Perangkat Lunak Berorientasi Objek Dengan Metode USDP (unified Software Development Process). Yogyakarta : Andi, 2010.

W. Gata and G. Gata, Sukses Membangun Aplikasi Penjualan Dengan Java. Jakarta : PT. Alex Media Komputindo, 2013.

E. Winarno ST M.Eng and Ali Zaki SmitDev Comunity, Step by Step Visual Basic.NET. Jakarta: PT. Alex Media Komputindo, 2012.

Dodit Suprianto, Membuat Aplikasi Dekstop Menggunakan Mysql Dan VB.NET Secara Profesional. Jakarta : Media Kita, 2010.

Y. Praptomo. PHS, Teknik Improvisasi Algoritma Kriptografi Klasik Dan Implementasinya. Yogyakarta.

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Pengamanan Pesan Teks E-Mail Menggunakan Metode Algoritma Bifid Dan Feedback Cipher

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 JURIKOM (Jurnal Riset Komputer)



JURIKOM (Jurnal Riset Komputer)

STMIK BUDI DARMA
Website : http://ejurnal.stmik-budidarma.ac.id/index.php/jurikom
Email : jurikom.stmikbd@gmail.com

Creative Commons License
Ciptaan disebarluaskan di bawah Lisensi Creative Commons Attribution 4.0 International.