Implementasi Enkripsi-Dekripsi dengan Algoritma RC2 Menggunakan Java

 (*)Muhammad Iqbal Assegaf Mail (Universitas Budi Luhur, Jakarta, Indonesia)
 Rahma Destias (Universitas Budi Luhur, Jakarta, Indonesia)
 Nidhea Sitaresmi (Universitas Budi Luhur, Jakarta, Indonesia)
 Yudi Wiharto (Universitas Budi Luhur, Jakarta, Indonesia)

(*) Corresponding Author

Submitted: June 4, 2020; Published: October 20, 2020

DOI: http://dx.doi.org/10.30865/mib.v4i4.2256

Abstract

Cryptography is a security tool used to hide a message. For that we need a security by means of encryption and decryption of data using cryptographic algorithms Rivest Code 2 (RC2). In the cryptographic algorithms Rivest Code 2 (RC2), designed in java programming netbeans which include the ability to operate directly for RC2 algorithm implemented by mode. Specifications architectures and languages into a specified algorithm implementation does not yet support 64-bit operating efficiently. Therefor, instead of using two 64-bit registers as in RC2, RC2 uses four 32-bit registers. Because it uses four registers there will be two rotation operation on each half-round there, and it will also be a lot of bits that will be used to affect the number of bits that are rotated. This multiplication operation is very effective in producing the effect of diffusion or which of course resulted in the deployment of more secure RC2. Android-based application that is generated by utilizing the latest technology

Keywords


Cryptography, Rivest Code 2 (RC2), Data Security, Encryption, Decryption, Algorithm

Full Text:

PDF


Article Metrics

Abstract View: 67 times | PDF View: 21 times

References

H. Mukhtar, Kriptografi untuk Keamanan Data. Yogyakarta: Deepublish, 2018.

I. A. Apreja A , Syarif Z, Analisis Tingkat Keamanan Enkripsi Data Menggunakan Algoritma Base 64 Encode, Annu. Res. Semin., vol. Vol.3, No., 2017.

M. Fikry, Aplikasi Java Kriptografi Menggunakan Algoritma Vigenere, Techsi, vol. 8, no. 1, pp. 19, 2016.

S. Maslakah and G. S. Widya, ENKRIPSI DAN DESKRIPSI DENGAN METODE DATA RC2 DENGAN MENGGUNAKAN BAHASA PEMROGRAMAN JAVA, no. 1412120087, pp. 110, 2017.

N. Jumrotul, M. Rifai Abdul, and I. Prasetyo Budi, JURNAL KEAMANAN KOMPUTER APLIKASI ENKRIPSI-DESKRIPSI DENGAN ALGORITMA RC2 MENGGUNAKAN JAVA NETBEANS, pp. 19, 2017.

V. Siahaan and R. H. Sianipar, DATABASE DAN KRIPTOGRAFI MENGGUNAKAN JAVA/MYSQL. Sparta Publishing, 2019.

V. Siahaan, BUKU PINTAR JAVA/SQLITE: Membuat Aplikasi Dekstop Kriptografi. Balige Publishing, 2020.

I. Gunawan, Keamana Data : Teori dan Implementasi, Volume 1 d. Google Publisher, 2020.

M. C. Sinaga, Kriptografi Python. 2017.

Mardiana, Pengembang Algoritma Block Chiper RC6 Pada Citra Digital, Universitas Sumatera Utara, 2013.

M. Naufal, IMPLEMENTASI STEGANOGRAFI DAN KRIPTOGRAFI UNTUK KEAMANAN DATA DENGAN METODE RC2 DAN LSB PADA CITRA BITMAP, Sekolah Tinggi Manajemen Informatika dan Komputer TRIGUNA DHARMA MEDAN, 2013.

E. Sutanto, Pemogram Andoroid Dengan Menggunakan Eclips dan StarUML. AIRLANGGA UNIVERSITY PRESS, 2018.

A. Hendini, Pemodelan Uml Sistem Informasi Monitoring Penjualan Dan Stok Barang, J. Chem. Inf. Model., 2013, doi: 10.1017/CBO9781107415324.004.

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Enkripsi-Dekripsi dengan Algoritma RC2 Menggunakan Java

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 JURNAL MEDIA INFORMATIKA BUDIDARMA

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.



JURNAL MEDIA INFORMATIKA BUDIDARMA
STMIK Budi Darma
Sekretariat : Jln. Sisingamangaraja No. 338 Telp 061-7875998
email : mib.stmikbd@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.