Implementasi Algoritma TEA dan Pontifex Dalam Keamanan Data File Dokumen
DOI:
https://doi.org/10.30865/jurikom.v7i3.2180Keywords:
Cryptography, Documents, TEA, PontifexAbstract
Data security is one of the most important aspects in information technology. With a high level of security, hopefully the information presented can be maintained its authenticity. In this final project a system that secures data and information stored on the computer from cryptanalysts is formed. The steps that the author did to make the process of forming the system include the stages of problem analysis, algorithm and flowchart along with modeling the structure of the program and design of the application interface, so that the application formed becomes easy to use and has optimal functions. By using TEA and pontifex algorithms which are secret key cryptographic algorithms, these problems can be overcome. The strength of this algorithm lies in the feistel network (including substitution operations, permutations and modular arithmetic) and delta numbers derived from the golden number.
References
M.A.Amri, dkk, 2009, “Pontifex Implementation In Quantum Cellular Automataâ€, Journal IEEE Trans. On Computer, Vol. 58, No. 6, pp.721-727.
Sony Bahagia Sinaga, 2018, “Pengamanan Pesan Komunikasi Menggunakan Algoritma Rsa, Rabbin Miller Dan Fungsi Sha-1 Serta Penanganan Man In The Middle Attack Dengan Interlock Protocolâ€, Jurnal Media Informasi Analisa dan Sistem (MEANS), Vol. 3, No.1.
Ariyus, Dony, 2005, “Kriptografi Keamanan Data Dan Komunikasiâ€. Edisi Pertama. Yogyakarta. Graha Ilmu.
Sadikin, Rifki, 2012, â€Kriptografi Untuk Keamanan Jaringanâ€, Penerbit Andi, Yogyakarta.
Ariyus, Dony, 2008, â€Computer Security, Andi, Yogyakarta.
Q. Mukti. 2014, â€Kriptografi File Citra Menggunakan Algoritma TEA (Tiny Encryption Algorithmâ€, Jurnal Techsi, Vol. 5 No. 2



