Implementasi Algoritma Lucifer Untuk Mengamankan Data Inventor Pergudangan
DOI:
https://doi.org/10.30865/komik.v6i1.5747Keywords:
Cryptography, Algorithms, DESAbstract
Data security is very important in maintaining the confidentiality of information, especially those containing information that is very important and should only be known by certain parties, let alone using delivery via public networks. Cryptography is the science and art of maintaining the confidentiality of data or text by converting it into a form that cannot be recognized anymore, one of the popular algorithms used in solving these problems is the Lucifer algorithm. Cryptography is a way or technique to secure data so that the confidentiality of the data is maintained, so as to avoid attacks by people who are not responsible for the data. This final project realizes a data security software with the Lucifer cryptographic technique algorithm using the Visual Studio 2008 method.References
D. Anggara and A. S. Sembiring, “Peningkatan Keamanan Data Teks Terenkripsi Algoritma Lucifer Menggunakan Steganografi Gifshuffle Pada Citra,†KOMIK (Konferensi Nas. Teknol. Inf. dan Komputer), vol. 3, no. 1, pp. 439–445, 2019, doi: 10.30865/komik.v3i1.1626.
B. K. Laia, “Modifikasi Algoritma Lucifer Dengan Menerapkan Pembangkitan Kunci Berdasarkan Naive Shuffle,†vol. 1, no. 3, pp. 110–118, 2022.
Eril obeit choiri, “Pengertian Kriptografi, Sejarah & Jenis Algoritmanyaâ€.
A. Hidayatullah and E. Insanudin, “Pengenalan Kriptografi dan Pemakaiannya Sehari-hari,†Pengenalan Kriptografi dan Pemakaiannya Sehari-hari, 2016.
shenier permata Semesta, “Pengertian Kriptografi Komponen dan Tujuan dari Kriptografiâ€.
riadi Muchlisin bsv academic, “No TitlePengertian, Sejarah dan Jenis Kriptografiâ€.
M. Suwanda, “implementasi teknik enkripsi algoritma twekable blok chiper pengamanan voice cha tpada perancangan aplikasi chating,†2021.
M. Mizan, “Studi perbandingan algoritma simetri lucifer dan blowfish,†Inst. tegnologi bogor, 2017.
H. H. H. B. Li et al., â€œæŽæ¬£ 1,2 æŽæ¸Š 1 ä»»äºšé¹ 2,†Sci. Total Environ., vol. 9, no. 1, pp. 1–10, 2020, [Online]. Available: https://doi.org/10.1016/j.scitotenv.2021.147444 https://doi.org/10.1016/j.soilbio.2021.108211 https://doi.org/10.1016/j.watres.2021.117597 https://doi.org/10.1016/j.scitotenv.2021.147016 https://doi.org/10.1016/j.scitotenv.2021.147133 https://doi.org/10.1
[10] G. Putrodjojo, “APLIKASI ALGORITMA DES (DATA ENCRYPTION STANDARD) UNTUK PENGAMAN DATA,†Dosen Jur. Tek. Inform. STMIK Raharja1 , Peneliti Badan Tenaga Atom Nas. (BATAN)2 , Alumni STMIK Dharma Putra3.

