IMPLEMENTASI ALGORITMA UNARY CODING UNTUK MENGKOMPRESI TEKS TERENKRIPSI EL GAMAL
DOI:
https://doi.org/10.30865/mib.v2i1.994Abstract
The speed at which information is transmitted is indispensable in current technological developments. Information is a message or a collection of messages or a data that has been processed so as to produce something needed by the party in need. Information can take the form of various data formats, including text, video or images. The problem of the speed of information delivery is often slightly inhibited due to the large file size of the information. In addition, the security factor is also very important, as many irresponsible parties will try to steal the information and may harm the stolen information when it is misused. The process undertaken in this study is to analyze the process of encryption and decryption algorithm El Gamal and compression algorithm Unary coding then designing security and compression applications using design tools such as Unified Modeling Language (UML) and Microsoft Visual Basic 2008 to simplify the making of applications. After completion of the design, then the file will be encrypted and compressed using applications that have been designed. Then, the result of the process is a text file that can not be understood and has a size smaller than the original.
References
A.Nugroho, Rekayasa Perangkat Lunak Berorientasi Objek dengan Metode USDP, Yogyakarta: ANDI. 2010
E.Setyaningsih, Kriptografi & Implementasinyaa Menggunakan Matlab, Yogyakarta: Penerbit Andi.2015
J.Enterprise, Rahasia Manajemen File, Jakarta: PT.Elex Media Komputindo.2010
L.Sitorus, M.Kom, Algoritma dan Pemrograman, Yogyakarta: Penerbit Andi. 2015
Wardana, Membuat Aplikasi Berbasis Pendekatan Sistem dengan Visual Basic .Net 2008, Jakarta : PT. Elex Media Komputindo.2008
W.Gata, G.Gata, Sukses Membangun Aplikasi Penjualan Dengan Java, Jakarta: PT.Elex Media Komputindo.2013
A.Aneta, “Implementasi Kebijakan Program Penanggulangan Kemiskinan Perkotaan (P2KP) di Kota Gorontaloâ€, Jurnal Administrasi Publik, vol.I, pp. 54-65. 2010
D. T. Massandy, “Algoritma ElGamal dalam Pengamanan Pesan Rahasiaâ€, Jurnal Institut Teknologi Bandung, pp. 1-5.2010
H.Christian, “Studi tentang Pelaksanaan Rencana Kerja Pembangunan Desa Tahun 2013 di Desa Loa Janan Ulu Kecamatan Loa Janan Kabupaten Kutai Kartanegaraâ€, eJournal Pemerintahan Integratif, vol.III, pp. 190-210. 2015
Hidayat, W.Zarman, et.al, “Implementasi Algoritma Kompresi LZW Pada Database Serverâ€, Jurnal Komputa, vol.II, pp. 7-14. 2013
P.Sulistyorini, “Pemodelan Visual dengan Menggunakan UML dan Rational Roseâ€, Jurnal Teknologi Informasi DINAMIK, Vol.XIV, pp.23-29, 2009
S.Kaur, “Entropy Coding and Different Coding Techniqueâ€, Journal of Network Communication and Emerging Technologies, vol.VI, pp. 4-7, 2016
Z.Amin, “Desain dan Implementasi Tunneling IPSEC Berbasis UNIX dengan ESP (Encapsulating Security Payload)â€, STMIK PalComTech, vol.II, pp109-119. 2012
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).