Perancangan Aplikasi Kriptografi Asimetris Dengan Menerapkan Metode Elliptic Curve Cryptography
DOI:
https://doi.org/10.54367/means.v3i1.221Keywords:
Kriptografi, Elliptic Curve Cryptography (ECC), Keamanan Teks.Abstract
Cryptography is one of the sciences used to maintain confidentiality and data security has been developing since ancient Greece. One cryptographic method that is quite reliable, stable and the parent of the popular cryptographic algorithms today is Elliptic Curve Cryptography (ECC). In this case the previous block encryption results are feedback into current block encryption. The trick, the current plaintext block is XORed first with the ciphertext block from the previous encryption, then the XOR results are entered into the encryption function. With ECC mode, each ciphertext block depends not only on the plaintext block but also on the all previous plaintext blocks, Implementation of the Elliptic Curve Cryptography (ECC) algorithm in this study was carried out by using an application built using visual basic programming language. Net 2008..References
. Syah Suhatman Surya, “Kamus Komputerâ€. Penerbit Rineka Cipta, Surabaya 2002.
. Kadir Abdul, “Pengenalan Teknologi informasiâ€. Penerbit Andi, Jakarta 2006,
. Arius Doni, “Pengantar Ilmu Kriptografiâ€. Penerbit Andi Publisher,Jakarta 2006.
. Sugiarti Y, “Analisis Dan Perancangan Unified Modeling Languange†, Penerbit Graha Ilmu, Jakarta 2014.
. Darmayuda Ketut, “Pemrograman Aplikasi Database Dengan Microsoft VisualBasic. Net 2008†,Penerbit Elex Media Komputindo.
Downloads
Published
2018-06-25
How to Cite
Sari, E. I. (2018). Perancangan Aplikasi Kriptografi Asimetris Dengan Menerapkan Metode Elliptic Curve Cryptography. MEANS (Media Informasi Analisa Dan Sistem), 3(1), 24–28. https://doi.org/10.54367/means.v3i1.221
Issue
Section
Daftar Artikel
License
Copyright (c) 2018 Media Informasi Analisa dan Sistem
This work is licensed under a Creative Commons Attribution 4.0 International License.