Implementasi Enkripsi-Dekripsi dengan Algoritma RC2 Menggunakan Java

Authors

  • Muhammad Iqbal Assegaf Universitas Budi Luhur, Jakarta
  • Rahma Destias Universitas Budi Luhur, Jakarta
  • Nidhea Sitaresmi Universitas Budi Luhur, Jakarta
  • Yudi Wiharto Universitas Budi Luhur, Jakarta

DOI:

https://doi.org/10.30865/mib.v4i4.2256

Keywords:

Cryptography, Rivest Code 2 (RC2), Data Security, Encryption, Decryption, Algorithm

Abstract

Cryptography is a security tool used to hide a message. For that we need a security by means of encryption and decryption of data using cryptographic algorithms Rivest Code 2 (RC2). In the cryptographic algorithms Rivest Code 2 (RC2), designed in java programming netbeans which include the ability to operate directly for RC2 algorithm implemented by mode. Specifications architectures and languages into a specified algorithm implementation does not yet support 64-bit operating efficiently. Therefor, instead of using two 64-bit registers as in RC2, RC2 uses four 32-bit registers. Because it uses four registers there will be two rotation operation on each half-round there, and it will also be a lot of bits that will be used to affect the number of bits that are rotated. This multiplication operation is very effective in producing the effect of diffusion or which of course resulted in the deployment of more secure RC2. Android-based application that is generated by utilizing the latest technology

Author Biographies

Muhammad Iqbal Assegaf, Universitas Budi Luhur, Jakarta

Fakultas Teknologi Informasi

Rahma Destias, Universitas Budi Luhur, Jakarta

Fakultas Teknologi Informasi

Nidhea Sitaresmi, Universitas Budi Luhur, Jakarta

Fakultas Teknologi Informasi

Yudi Wiharto, Universitas Budi Luhur, Jakarta

Fakultas Teknologi Informasi

References

H. Mukhtar, Kriptografi untuk Keamanan Data. Yogyakarta: Deepublish, 2018.

I. A. Apreja A , Syarif Z, “Analisis Tingkat Keamanan Enkripsi Data Menggunakan Algoritma Base 64 Encode,” Annu. Res. Semin., vol. Vol.3, No., 2017.

M. Fikry, “Aplikasi Java Kriptografi Menggunakan Algoritma Vigenere,” Techsi, vol. 8, no. 1, pp. 1–9, 2016.

S. Maslakah and G. S. Widya, “ENKRIPSI DAN DESKRIPSI DENGAN METODE DATA RC2 DENGAN MENGGUNAKAN BAHASA PEMROGRAMAN JAVA,” no. 1412120087, pp. 1–10, 2017.

N. Jumrotul, M. Rifa’i Abdul, and I. Prasetyo Budi, “JURNAL KEAMANAN KOMPUTER APLIKASI ENKRIPSI-DESKRIPSI DENGAN ALGORITMA RC2 MENGGUNAKAN JAVA NETBEANS,” pp. 1–9, 2017.

V. Siahaan and R. H. Sianipar, DATABASE DAN KRIPTOGRAFI MENGGUNAKAN JAVA/MYSQL. Sparta Publishing, 2019.

V. Siahaan, BUKU PINTAR JAVA/SQLITE: Membuat Aplikasi Dekstop Kriptografi. Balige Publishing, 2020.

I. Gunawan, Keamana Data : Teori dan Implementasi, Volume 1 d. Google Publisher, 2020.

M. C. Sinaga, Kriptografi Python. 2017.

Mardiana, “Pengembang Algoritma Block Chiper RC6 Pada Citra Digital,” Universitas Sumatera Utara, 2013.

M. Naufal, “IMPLEMENTASI STEGANOGRAFI DAN KRIPTOGRAFI UNTUK KEAMANAN DATA DENGAN METODE RC2 DAN LSB PADA CITRA BITMAP,” Sekolah Tinggi Manajemen Informatika dan Komputer TRIGUNA DHARMA MEDAN, 2013.

E. Sutanto, Pemogram Andoroid Dengan Menggunakan Eclips dan StarUML. AIRLANGGA UNIVERSITY PRESS, 2018.

A. Hendini, “Pemodelan Uml Sistem Informasi Monitoring Penjualan Dan Stok Barang,” J. Chem. Inf. Model., 2013, doi: 10.1017/CBO9781107415324.004.

Downloads

Published

2020-10-20