Implementasi Algoritma Lucifer Untuk Mengamankan Data Inventor Pergudangan

 (*)Kasmiran Kasmiran Mail (Universitas Budi Darma, Medan, Indonesia)
 Pristiwanto Pristiwanto (Universitas Budi Darma, Medan, Indonesia)
 Siti Nurhabibah Hutagalung (Universitas Budi Darma, Medan, Indonesia)

(*) Corresponding Author

Abstract

Data security is very important in maintaining the confidentiality of information, especially those containing information that is very important and should only be known by certain parties, let alone using delivery via public networks. Cryptography is the science and art of maintaining the confidentiality of data or text by converting it into a form that cannot be recognized anymore, one of the popular algorithms used in solving these problems is the Lucifer algorithm. Cryptography is a way or technique to secure data so that the confidentiality of the data is maintained, so as to avoid attacks by people who are not responsible for the data. This final project realizes a data security software with the Lucifer cryptographic technique algorithm using the Visual Studio 2008 method.

Keywords


Cryptography; Algorithms; DES

Full Text:

PDF


Article Metrics

Abstract view : 179 times
PDF - 42 times

References

D. Anggara and A. S. Sembiring, “Peningkatan Keamanan Data Teks Terenkripsi Algoritma Lucifer Menggunakan Steganografi Gifshuffle Pada Citra,” KOMIK (Konferensi Nas. Teknol. Inf. dan Komputer), vol. 3, no. 1, pp. 439–445, 2019, doi: 10.30865/komik.v3i1.1626.

B. K. Laia, “Modifikasi Algoritma Lucifer Dengan Menerapkan Pembangkitan Kunci Berdasarkan Naive Shuffle,” vol. 1, no. 3, pp. 110–118, 2022.

Eril obeit choiri, “Pengertian Kriptografi, Sejarah & Jenis Algoritmanya”.

A. Hidayatullah and E. Insanudin, “Pengenalan Kriptografi dan Pemakaiannya Sehari-hari,” Pengenalan Kriptografi dan Pemakaiannya Sehari-hari, 2016.

shenier permata Semesta, “Pengertian Kriptografi Komponen dan Tujuan dari Kriptografi”.

riadi Muchlisin bsv academic, “No TitlePengertian, Sejarah dan Jenis Kriptografi”.

M. Suwanda, “implementasi teknik enkripsi algoritma twekable blok chiper pengamanan voice cha tpada perancangan aplikasi chating,” 2021.

M. Mizan, “Studi perbandingan algoritma simetri lucifer dan blowfish,” Inst. tegnologi bogor, 2017.

H. H. H. B. Li et al., “李欣 1,2 李渊 1 任亚鹏 2,” Sci. Total Environ., vol. 9, no. 1, pp. 1–10, 2020, [Online]. Available: https://doi.org/10.1016/j.scitotenv.2021.147444 https://doi.org/10.1016/j.soilbio.2021.108211 https://doi.org/10.1016/j.watres.2021.117597 https://doi.org/10.1016/j.scitotenv.2021.147016 https://doi.org/10.1016/j.scitotenv.2021.147133 https://doi.org/10.1

[10] G. Putrodjojo, “APLIKASI ALGORITMA DES (DATA ENCRYPTION STANDARD) UNTUK PENGAMAN DATA,” Dosen Jur. Tek. Inform. STMIK Raharja1 , Peneliti Badan Tenaga Atom Nas. (BATAN)2 , Alumni STMIK Dharma Putra3.

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Algoritma Lucifer Untuk Mengamankan Data Inventor Pergudangan

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Kasmiran Kasmiran, Pristiwanto Pristiwanto, Siti Nurhabibah Hutagalung

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)
P3M STMIK Budi Darma
Sekretariat Jln. Sisingamangaraja No. 338 Telp 061-7875998
email: komik@univ-bd.ac.id, komik.budidarma@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.