Perancangan Perangkat Lunak Kriptografi Menggunakan Gronsfeld Cipher, Vernam Cipher dan Ron Code 4 Stream Cipher

Ade Lita Noviani, I Dewa Ayu Eka Yuliani

Abstract


The process of sending data is done as the internet media, and other media. Basically the data transmission without any security to the content of the data sent, so that when the tapping on the flow of the delivery of data that can be intercepted immediately read tappers. For that required software as a supporter using a particular method of encryption (cryptography) so that the messages contained in the data sent to be safe. The data collection techniques used in this study with literature study to obtain the theory of cryptography Gronsfeld Cipher, Vernam Cipher and Ron Code 4 Stream Cipher. While the software design method using RAD (Rapid Application Development) The design of software using Microsoft Visual Basic.Net programming language of this design resulted in a combined cryptosystem application Gronsfeld Cipher, Vernam Cipher and Ron Code 4 Stream Cipher. Combined cryptosystem software Gronsfeld Cipher, Vernam Cipher and Ron Code 4 Stream Cipher in the presence of this device, confidentiality and authenticity of information will be more awake

Keywords


Perangkat lunak kriptografi; Kriptosistem gabungan; Gronsfeld Cipher; Vernam Cipher dan Ron Code 4 Stream Cipher; Visual Basic.Net; Prototype;

Full Text:

PDF

References


Azanuddin, Penyandian Short Message Service (SMS) Pada Telepon Selular Dengan Menggunakan Algoritma Gronsfeld, Pelita Informatika Budi Darma, Volume : IV, Nomor: 1, Agustus 2013 ISSN : 2301-9425

Khairani Puspita1, M. Rhifky Wayahdi2.,2015. Analisis Kombinasi Metode Caesar Cipher, Vernam Cipher, dan Hill Cipher dalam Proses Kriptografi , ISSN 2302-3805

Dwi Irfianti,Asti., ( 2007)., Metode Pengamanan Ekkripsi RC4 Stream Cipher Untuk Aplikasi Pelayanan Gangguan. ISSN : 1907-5022

Nazir, M. 2005. Metode Penelitian. Jakarta: Ghalia Indonesia

Sugiyono. 2012. Metode Penelitian Kombinasi (Mixed Methods). Bandung: Alfabeta




DOI: http://dx.doi.org/10.30700/.v2i1.931

Article Metrics

Abstract view : 296 times
PDF - 367 times

Refbacks

  • There are currently no refbacks.