Perancangan Aplikasi Penyandian Pesan Teks Menggunakan Vigenere Chiper Dan Algoritma Elgamal
DOI:
https://doi.org/10.54367/means.v2i2.142Keywords:
Penyandian Pesan Teks, Algoritma ElGamal, Vigenere ChiperAbstract
The development of technology and information, especially in the field of information communication, is very rapidly developing, one of them is the communication media of smart phones. one of the facilities provided by smart phones is the exchange of information in the form of sending text messages through Short Message Service (SMS). This information can be in the form of important data that not all parties can find out. Some risks that can threaten message security in SMS services include SMS Spoofing, Snooping SMS and SMS Interception. The message security system in the form of text is one of them with a cryptographic system. Cryptography is a message security science that aims to maintain the confidentiality of information contained in data so that information cannot be known by irresponsible parties. Cryptography changes the meaningful writing to be meaningless by using various kinds of cryptographic algorithms. The algorithms used are ElGamal and Vigenere Chiper. The ElGamal algorithm uses 2 different keys in encrypting and decrypting the public key for encryption and the private key for decryption. While Vigenere chipers only use one key that is the same for encryption and description. With the text message encoding application using the ElGamal and Vigenere Chiper algorithms, it is expected to help smart phone users with the operating system.References
Ariyus, Dony. (2008). Pengantar Ilmu KRIFTOGRAFI Teori, Analisis, dan Implementasi. Yogyakarta:ANDI
Arjana, Putu H., Tri Puji Rahayu., Yakub., Hariyanto. 2012. “Implementasi Enkripsi Data Dengan Algoritma Vigenere Chiperâ€.Seminar Nasional Teknologi Informasi dan Komunikasi 2012 (SENTIKA 2012). 2089-9815,165-166.
Dengen, Nataniel., Heliza Rahmania Hatta. 2009. “Perancangan Sistem Informasi Terpadu Pemerintah Daerah Kabupaten Paserâ€.Jurnal Informatika Mulawarman.. 2089-9815,48.
Dilihatya.com, Informasi Online, Retrieved May 02 , 2015, from http://dilihatya.com/1178/pengertian-aplikasi-menurut-para-ahli
Ifanto, Mukhammad, 2009. “Metode Enkripsi Dan Dekripsi Dengan Menggunakan Algoritma Elgamalâ€. Makalah If2091 Struktur Diskrit.2-4.
Kromodimoeljo, Sentot. (2009). Teori dan Aplikasi Kriptografi. Yogyakarta:SPK IT Consulting
Komputer_Wahana. (2013). Step by Step Menjadi Pemrograman Android, Yogyakarta:ANDI
Metode dan Algoritma, Retrieved May 02 , 2015, from http://www.metode-algoritma.com/2013/06/algoritma-kriptografi.html
Nugroho, Adi. (2010). Rekayasa Perangkat Lunak Berorientasi Objek dengan Metode USDP, Yogyakarta:ANDI
panduaji, Retrieved May 03 , 2015, fromhttp://www.panduaji.net/2011/11/tutorial-dasar-eclipse.html
Rachmat, Antonius C. (2010). Algoritma dan Pemrograman dengan Bahasa C-Konsep, Teori, & Implementasi. Yogyakarta:ANDI
Rahman’s personal Blog, Blog Tutorial Coding Indonesia, Retrieved May 18, 2015, fromhttp://rahmansurya.net/teknik-dasar-kriptografi/
Sahidin, Rifky. (2012). Kriptografi untuk keamanan jaringan, Yogyakarta:ANDI
Saputra, Agus, (2011). Step By Step Membangun Aplikasi SMS dengan PHP dan Mysql. Jakarta:PT. Alex Media Komputindo
Sugiarti,Yuni. (2013). ANALISIS DAN PERANCANGAN UML (Unified Modeling Languange) Generated VB. 6, Yogtakarta:Graha Ilmu
Satyaputra, Alfa. M.Sc. dan Eva.Maulina.Aritonang. S.Kom. (2012). JAVA for Beginners with Eclipse 4.2 Juno, Jakarta: PT. Alex Media Komputindo
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 Media Informasi Analisa dan Sistem
This work is licensed under a Creative Commons Attribution 4.0 International License.