Perancangan Aplikasi Kriptografi Asimetris Dengan Menerapkan Metode Elliptic Curve Cryptography

Authors

  • Eka Indah Sari STMIK Budi Darma Medan

DOI:

https://doi.org/10.54367/means.v3i1.221

Keywords:

Kriptografi, Elliptic Curve Cryptography (ECC), Keamanan Teks.

Abstract

Cryptography is one of the sciences used to maintain confidentiality and data security has been developing since ancient Greece. One cryptographic method that is quite reliable, stable and the parent of the popular cryptographic algorithms today is Elliptic Curve Cryptography (ECC). In this case the previous block encryption results are feedback into current block encryption. The trick, the current plaintext block is XORed first with the ciphertext block from the previous encryption, then the XOR results are entered into the encryption function. With ECC mode, each ciphertext block depends not only on the plaintext block but also on the all previous plaintext blocks, Implementation of the Elliptic Curve Cryptography (ECC) algorithm in this study was carried out by using an application built using visual basic programming language. Net 2008..

Author Biography

Eka Indah Sari, STMIK Budi Darma Medan

STMIK Budi Darma Medan

References

. Syah Suhatman Surya, “Kamus Komputerâ€. Penerbit Rineka Cipta, Surabaya 2002.

. Kadir Abdul, “Pengenalan Teknologi informasiâ€. Penerbit Andi, Jakarta 2006,

. Arius Doni, “Pengantar Ilmu Kriptografiâ€. Penerbit Andi Publisher,Jakarta 2006.

. Sugiarti Y, “Analisis Dan Perancangan Unified Modeling Languange†, Penerbit Graha Ilmu, Jakarta 2014.

. Darmayuda Ketut, “Pemrograman Aplikasi Database Dengan Microsoft VisualBasic. Net 2008†,Penerbit Elex Media Komputindo.

Published

2018-06-25

How to Cite

Sari, E. I. (2018). Perancangan Aplikasi Kriptografi Asimetris Dengan Menerapkan Metode Elliptic Curve Cryptography. MEANS (Media Informasi Analisa Dan Sistem), 3(1), 24–28. https://doi.org/10.54367/means.v3i1.221

Issue

Section

Daftar Artikel