Implementasi Liniear Congruential Generator Pada Pembangkitan Inizialization Vector Pada Kriptografi CBC Sederhana

Sari Kurnia Riski, Tommy Tommy, Arief Budiman

Abstract


In this era of increasingly advanced technology, data security is very important in maintaining the confidentiality of information, especially those containing sensitive information whose contents should only be known by the entitled party, especially if the delivery is made through a public network, if the data is not secured first. , will be very easy to be tapped and the contents of the information known by parties who do not have the authority. One way that is used for data security is to use a cryptographic system, namely by encoding or keying the information content using a data locking algorithm method. Here this author will discuss about generating IV using the LCG algorithm are combined by XORing everyption method in simple CBC cryptography where these two algorithm are combined by XORing every bit that exists with the key or block provided. Aims to produce plaintext that has been convertd into ciphertext or secret data.

 

Keywords : data security, cryptographic algorithm lcg, xor cipher, simple cbc method.


Full Text:

PDF

References


Abood, O. G., & Guirguis, S. K. (2018). A Survey on Cryptography Algorithms.International Journal of Scientific and Research Publications (IJSRP), 8(7). https://doi.org/10.29322/ijsrp.8.7.2018.p7978

Agustina Felisia. (2020) https://caraharian.com/kode-ascii-adalah.html#

Deny Nugroho Triwibowo. (2021) Enkripsi Pesan Menggunakan Algoritma Liniear Vol.3.No.3. http://doi.org/10./2928/biste.v313.5546

Devi Andriani (2017) Perancangan Aplikasi Penyandian Teks Dengan Menggunakan Algoritma Chiper Block Chaining. Jurnal Teknik Informatika Unika St. Thomas (JTIUST), Volume 02 Nomor 02, Desember 2017, ISSN : 2548-1916

Dropbox.(2021) https://experience.dropbox.com/id-id/resources/flowcharts

Dwi Latifatul Fajri (2022). https://katadata.co.id/agung/digital/62a8742d8c024/flowchart- adalah-bagan-alir-berikut-pengertian-dan-jenisnya

Hak Cipta © 2022 KK. https://www-crypto--it-net.translate.goog/eng/theory/pseudorandom- generator.html?_x_tr_sch=http&_x_tr_sl=en&_x_tr_tl=id&_x_tr_hl=id&_x_tr_pto=sc

Helmi Sahara.(2018) Implementasi Pengamanan Pesan Chatting Menggunakan Metode Vigenere Cipher dan Cipher Block Chaining. Jurnal Means. Vol 3. No.2, http://ejournal.ust.ac.id/indexphp/jurnal_Means

Kita Informatika (2018). http://www.kitainformatika.com/2018/07/algoritma-xor-chiper- untuk-mengatasi.html

Kurniawan (2017) Apa yang dimaksud dengan Inizialization Vector. https://www.dellenpedia.com/2017/07/apa-yang-dimaksud-dengan- initialization.html?m=1

Maya utami dewi,M.Kom (2021) Universitas Stekom. http://sistem-informasi- s1.stekom.ac.id/informasi/baca/JENIS-JENIS-KEAMANAN- DATA/15d1ee116284b85e5de3e00564518367fe994de7

Muhammad Robith Adani (2021) blog programming. https://www.sekawanmedia.co.id/blog/pengertian-kriptografi/

OMG. (2017) Pengertian Use Case Diagram. Unified Modeling Language

Rachmat Aulia, dkk.(2019) Penerapan Algoritma One Time Pad dan Liniear Congruential Generator Untuk Keamanan Pesan Teks. Jurnal Nasional Informatika dan Teknologi Jaringan.Vol.4 No.1. Avalible Online at : http://bit.ly/InfoTekjar

Sebastian Suhandinata, dkk. (2019) Analisa Performa Kriptografi Hybrid Algoritma Blowfish dan Algoritma RSA. Jurnal Teknologi Informasi, VI(01):1-10. Doi: http://doi.10.33330/jurteksi.v6i1.395

Waruwu, T.S.,dan Nasution,S. (2018) Pengembangan Keamanan Web Login Portal Dosen Menggunakan UML. Jurnal Mahajana Informasi, 3(1) 34-40.

Wikipedia.(2022) https://en-m- wikipediaorg.translate.goog/wiki/Linear_congruential_generator?_x_tr_sl=en&_x_tr_tl=id&_ x_tr_hl=id&_x_tr_pto=tc,sc

dok.com.https://text-id.123dok.com/document/ozll1rooz-pengertian-microsoft-visual- studio-2010-sejarah-singkat-microsoft-visual-studio-2010.html




DOI: http://dx.doi.org/10.30829/algoritma.v7i1.15409

Refbacks

  • There are currently no refbacks.


Indexing:

    

 

 

Creative Commons License

Algoritma: Jurnal Ilmu Komputer dan Informatika

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.