RANCANG BANGUN APLIKASI PENGAMAN ISI FILE DOKUMEN DENGAN ALGORITMA RSA
Abstract
Document security is one of the most important things in the exchange of data, especially the exchange of data in the virtual world in which there are many threats when the process is done. Data security, especially for text documents for an organization that assumes that the document is confidential (private and confidential). One aspect of security in a text document is its authenticity, form and contents must be in accordance with the intended by the author. Until now the cryptographic system is one solution to ensure the security of a data that is by encode the contents or content file the document becomes difficult content not even understood through the process of encryption and to recover the original information is done, the decryption process is accompanied by using the key correct. One of the most popular methods in cryptography is RSA, which to this day is very difficult to solve and will take a very long time. This method uses 2 (two) keys, namely public key and private key. Where the key length can be determined and adjusted to the desired level of security.
Keywords: data security, RSA, cryptography
Full Text:
PDFReferences
Al Azad, Aqib. 2012. "Efficient VLSI Implementation of DES and Triple DES Algorithm with Cipher Block Chaining concept using Verilog and FPGA." International Journal of Computer Applications (0975-8887) 1-10.
Ariyus, Donny. 2009. Keamanan Multimedia. Yogyakarta: Andi Offset.
Beny. 2012. Analisis Dan Perancangan Sistem Kriptografi Simetris Triple DES Dan Kriptografi Asimetris RSA. Medan: Univesitas Sumatra Utara.
Cox, Ingemar, Matthew Miller, Jeffrey Bloom, Jessica Fidrich, and Ton Kalker. 2008. Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems). Burlington: Morgan Kaufman.
Harahap, Putri Hartati. 2010. Teknik Pendeteksian Kerusakan File Dokumen Dengan Metode Cyclic Redundancy Check 32 (CRC32). Medan: Universitas Sumatra Utara.
Kekre, H B, Archana Athawale, and Pallavi N Halarnkar. 2008. "Increased Capacity of Information Hiding in LSB's Method for Text and Image." International Journal of Electrical, Computer & Systems Engineering 246-249.
Kipper, Gregory. 2004. Investigator's Guide To Steganography. Auerbach: CRL Press LLC.
Lestriandoko, Nova Hadi. 2006. "Pengacakan Pola Steganografi Untuk Meningkatkan Keamanan Penyembunyian Data Digita." Seminar Nasional Aplikasi Teknologi Informasi 2006.
Munir, Rinaldi. 2006. Kriptografi. Bandung: Informatika.
Suharja, Marchel Yan. 2009. Perancangan Program Aplikasi Audio Steganografi Dengan Menggunakan Metode Kriptografi Rijndael Advanced Encryption Standard. Jakarta: Universitas Bina Nusantara.
Tanenbaum, Andrew S, and Todd Austin. 2012. Structured Computer Organization 6th Edition. New Jersey: Prentice Hall.
Wibowo, Rudini. 2012. Perancangan Program Penyembunyian Pesan Audio Dengan Metode Steganografi Least Significant Bit Berbasis Android. Jakarta: Universitas Bina Nusantara.
DOI: http://dx.doi.org/10.30829/algoritma.v1i01.1309
Refbacks
- There are currently no refbacks.
Indexing:
|
Algoritma: Jurnal Ilmu Komputer dan Informatika
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.