Implementasi Algoritma Rot Dan Subtitusional Block Cipher Dalam Mengamankan Data
AbstractThe security and confidentiality of data is one of the most important aspects in the information system at this time. Caused by the rapid development of science and technology that allows the emergence of new techniques, which are misused by certain parties that threaten the security of information systems. In general, the data are categorized into two, namely confidential data and data that is not confidential. Data that is not confidential is usually not too much attention. What really needs to be considered is confidential data, where every information contained in it will be very valuable for those who need it because the data can be easily duplicated. The ROT-n algorithm is one simple encryption algorithm that uses alphabetical shifts as much as n to convert plain text into cipher text, whereas Block ciphers work by processing data in blocks, where several characters / data are combined into one block. Each one block process produces one block output as well.
Adi Nugroho, â€œRekayasa Perangkat Lunak Berorientasi Objek Dengan Metode USDPâ€, Penerbit Andi, Bandung, 2010
Dafid, â€œKriptografi Kunci Simetri Dengan Menggunakan Algoritma Crytonâ€, Vol. 2, No. 3, 2006
Kaidir, Abdul, â€œPengenalan Algoritma Pendekatan Secara Visual Dan Interaktif Menggunakan Raptorâ€, Penerbit Andi, Yogyakarta, 2013
Nurli Hairiah, â€œAnalisa Dan Implementasi Algoritma Cipher Block Chaining Dalam Penyandian Teks â€, Vol. 5, No. 1, 2015
Rifki Sadikin, â€œKriptografi Untuk Keamanan Jaringan â€, Penerbit Andi, Yogyakarta, 2012
Rinaldi Munir, â€œKriptografiâ€, Penerbit Informatika Bandung, Bandung, Edisi 1, 2006
Tata Sutabri, â€œSistem Informasi Manajemen â€, Penerbit Andi, Yogyakarta, 2005
How to Cite
Copyright (c) 2017 Media Informasi Analisa dan Sistem
This work is licensed under a Creative Commons Attribution 4.0 International License.