Implementasi Algoritma TEA dan Pontifex Dalam Keamanan Data File Dokumen

 (*)Saripah Aini Mail (STMIK Budi Darma, Medan, Indonesia)

(*) Corresponding Author

DOI: http://dx.doi.org/10.30865/jurikom.v7i3.2180

Abstract

Data security is one of the most important aspects in information technology. With a high level of security, hopefully the information presented can be maintained its authenticity. In this final project a system that secures data and information stored on the computer from cryptanalysts is formed. The steps that the author did to make the process of forming the system include the stages of problem analysis, algorithm and flowchart along with modeling the structure of the program and design of the application interface, so that the application formed becomes easy to use and has optimal functions. By using TEA and pontifex algorithms which are secret key cryptographic algorithms, these problems can be overcome. The strength of this algorithm lies in the feistel network (including substitution operations, permutations and modular arithmetic) and delta numbers derived from the golden number.

Keywords


Cryptography, Documents, TEA, Pontifex

Full Text:

PDF


Article Metrics

Abstract view : 90 times
PDF - 35 times

References

M.A.Amri, dkk, 2009, “Pontifex Implementation In Quantum Cellular Automata”, Journal IEEE Trans. On Computer, Vol. 58, No. 6, pp.721-727.

Sony Bahagia Sinaga, 2018, “Pengamanan Pesan Komunikasi Menggunakan Algoritma Rsa, Rabbin Miller Dan Fungsi Sha-1 Serta Penanganan Man In The Middle Attack Dengan Interlock Protocol”, Jurnal Media Informasi Analisa dan Sistem (MEANS), Vol. 3, No.1.

Ariyus, Dony, 2005, “Kriptografi Keamanan Data Dan Komunikasi”. Edisi Pertama. Yogyakarta. Graha Ilmu.

Sadikin, Rifki, 2012, ”Kriptografi Untuk Keamanan Jaringan”, Penerbit Andi, Yogyakarta.

Ariyus, Dony, 2008, ”Computer Security, Andi, Yogyakarta.

Q. Mukti. 2014, ”Kriptografi File Citra Menggunakan Algoritma TEA (Tiny Encryption Algorithm”, Jurnal Techsi, Vol. 5 No. 2

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Algoritma TEA dan Pontifex Dalam Keamanan Data File Dokumen

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 JURIKOM (Jurnal Riset Komputer)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JURIKOM (Jurnal Riset Komputer)

STMIK BUDI DARMA
Website : http://ejurnal.stmik-budidarma.ac.id/index.php/jurikom
Email : jurikom.stmikbd@gmail.com

Creative Commons License
Ciptaan disebarluaskan di bawah Lisensi Creative Commons Attribution 4.0 International.