Implementasi Enkripsi-Dekripsi dengan Algoritma RC2 Menggunakan Java
DOI:
https://doi.org/10.30865/mib.v4i4.2256Keywords:
Cryptography, Rivest Code 2 (RC2), Data Security, Encryption, Decryption, AlgorithmAbstract
Cryptography is a security tool used to hide a message. For that we need a security by means of encryption and decryption of data using cryptographic algorithms Rivest Code 2 (RC2). In the cryptographic algorithms Rivest Code 2 (RC2), designed in java programming netbeans which include the ability to operate directly for RC2 algorithm implemented by mode. Specifications architectures and languages into a specified algorithm implementation does not yet support 64-bit operating efficiently. Therefor, instead of using two 64-bit registers as in RC2, RC2 uses four 32-bit registers. Because it uses four registers there will be two rotation operation on each half-round there, and it will also be a lot of bits that will be used to affect the number of bits that are rotated. This multiplication operation is very effective in producing the effect of diffusion or which of course resulted in the deployment of more secure RC2. Android-based application that is generated by utilizing the latest technology
References
H. Mukhtar, Kriptografi untuk Keamanan Data. Yogyakarta: Deepublish, 2018.
I. A. Apreja A , Syarif Z, “Analisis Tingkat Keamanan Enkripsi Data Menggunakan Algoritma Base 64 Encode,” Annu. Res. Semin., vol. Vol.3, No., 2017.
M. Fikry, “Aplikasi Java Kriptografi Menggunakan Algoritma Vigenere,” Techsi, vol. 8, no. 1, pp. 1–9, 2016.
S. Maslakah and G. S. Widya, “ENKRIPSI DAN DESKRIPSI DENGAN METODE DATA RC2 DENGAN MENGGUNAKAN BAHASA PEMROGRAMAN JAVA,” no. 1412120087, pp. 1–10, 2017.
N. Jumrotul, M. Rifa’i Abdul, and I. Prasetyo Budi, “JURNAL KEAMANAN KOMPUTER APLIKASI ENKRIPSI-DESKRIPSI DENGAN ALGORITMA RC2 MENGGUNAKAN JAVA NETBEANS,” pp. 1–9, 2017.
V. Siahaan and R. H. Sianipar, DATABASE DAN KRIPTOGRAFI MENGGUNAKAN JAVA/MYSQL. Sparta Publishing, 2019.
V. Siahaan, BUKU PINTAR JAVA/SQLITE: Membuat Aplikasi Dekstop Kriptografi. Balige Publishing, 2020.
I. Gunawan, Keamana Data : Teori dan Implementasi, Volume 1 d. Google Publisher, 2020.
M. C. Sinaga, Kriptografi Python. 2017.
Mardiana, “Pengembang Algoritma Block Chiper RC6 Pada Citra Digital,” Universitas Sumatera Utara, 2013.
M. Naufal, “IMPLEMENTASI STEGANOGRAFI DAN KRIPTOGRAFI UNTUK KEAMANAN DATA DENGAN METODE RC2 DAN LSB PADA CITRA BITMAP,” Sekolah Tinggi Manajemen Informatika dan Komputer TRIGUNA DHARMA MEDAN, 2013.
E. Sutanto, Pemogram Andoroid Dengan Menggunakan Eclips dan StarUML. AIRLANGGA UNIVERSITY PRESS, 2018.
A. Hendini, “Pemodelan Uml Sistem Informasi Monitoring Penjualan Dan Stok Barang,” J. Chem. Inf. Model., 2013, doi: 10.1017/CBO9781107415324.004.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).