IMPLEMENTASI ALGORITMA UNARY CODING UNTUK MENGKOMPRESI TEKS TERENKRIPSI EL GAMAL

 (*)Fitri Angelina Siahaan Mail (STMIK Budi Darma Jln. Sisingamangaraja No. 338 Medan, Indonesia)

(*) Corresponding Author

Abstract

The speed at which information is transmitted is indispensable in current technological developments. Information is a message or a collection of messages or a data that has been processed so as to produce something needed by the party in need. Information can take the form of various data formats, including text, video or images. The problem of the speed of information delivery is often slightly inhibited due to the large file size of the information. In addition, the security factor is also very important, as many irresponsible parties will try to steal the information and may harm the stolen information when it is misused. The process undertaken in this study is to analyze the process of encryption and decryption algorithm El Gamal and compression algorithm Unary coding then designing security and compression applications using design tools such as Unified Modeling Language (UML) and Microsoft Visual Basic 2008 to simplify the making of applications. After completion of the design, then the file will be encrypted and compressed using applications that have been designed. Then, the result of the process is a text file that can not be understood and has a size smaller than the original.

Full Text:

PDF


Article Metrics

Abstract view : 470 times
PDF - 426 times

References

A.Nugroho, Rekayasa Perangkat Lunak Berorientasi Objek dengan Metode USDP, Yogyakarta: ANDI. 2010

E.Setyaningsih, Kriptografi & Implementasinyaa Menggunakan Matlab, Yogyakarta: Penerbit Andi.2015

J.Enterprise, Rahasia Manajemen File, Jakarta: PT.Elex Media Komputindo.2010

L.Sitorus, M.Kom, Algoritma dan Pemrograman, Yogyakarta: Penerbit Andi. 2015

Wardana, Membuat Aplikasi Berbasis Pendekatan Sistem dengan Visual Basic .Net 2008, Jakarta : PT. Elex Media Komputindo.2008

W.Gata, G.Gata, Sukses Membangun Aplikasi Penjualan Dengan Java, Jakarta: PT.Elex Media Komputindo.2013

A.Aneta, “Implementasi Kebijakan Program Penanggulangan Kemiskinan Perkotaan (P2KP) di Kota Gorontalo”, Jurnal Administrasi Publik, vol.I, pp. 54-65. 2010

D. T. Massandy, “Algoritma ElGamal dalam Pengamanan Pesan Rahasia”, Jurnal Institut Teknologi Bandung, pp. 1-5.2010

H.Christian, “Studi tentang Pelaksanaan Rencana Kerja Pembangunan Desa Tahun 2013 di Desa Loa Janan Ulu Kecamatan Loa Janan Kabupaten Kutai Kartanegara”, eJournal Pemerintahan Integratif, vol.III, pp. 190-210. 2015

Hidayat, W.Zarman, et.al, “Implementasi Algoritma Kompresi LZW Pada Database Server”, Jurnal Komputa, vol.II, pp. 7-14. 2013

P.Sulistyorini, “Pemodelan Visual dengan Menggunakan UML dan Rational Rose”, Jurnal Teknologi Informasi DINAMIK, Vol.XIV, pp.23-29, 2009

S.Kaur, “Entropy Coding and Different Coding Technique”, Journal of Network Communication and Emerging Technologies, vol.VI, pp. 4-7, 2016

Z.Amin, “Desain dan Implementasi Tunneling IPSEC Berbasis UNIX dengan ESP (Encapsulating Security Payload)”, STMIK PalComTech, vol.II, pp109-119. 2012

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 MEDIA INFORMATIKA BUDIDARMA





JURNAL MEDIA INFORMATIKA BUDIDARMA
STMIK Budi Darma
Secretariat: Sisingamangaraja No. 338 Telp 061-7875998
Email: mib.stmikbd@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.