Implementasi Liniear Congruential Generator Pada Pembangkitan Inizialization Vector Pada Kriptografi CBC Sederhana
Abstract
In this era of increasingly advanced technology, data security is very important in maintaining the confidentiality of information, especially those containing sensitive information whose contents should only be known by the entitled party, especially if the delivery is made through a public network, if the data is not secured first. , will be very easy to be tapped and the contents of the information known by parties who do not have the authority. One way that is used for data security is to use a cryptographic system, namely by encoding or keying the information content using a data locking algorithm method. Here this author will discuss about generating IV using the LCG algorithm are combined by XORing everyption method in simple CBC cryptography where these two algorithm are combined by XORing every bit that exists with the key or block provided. Aims to produce plaintext that has been convertd into ciphertext or secret data.
Keywords : data security, cryptographic algorithm lcg, xor cipher, simple cbc method.
Full Text:
PDFReferences
Abood, O. G., & Guirguis, S. K. (2018). A Survey on Cryptography Algorithms.International Journal of Scientific and Research Publications (IJSRP), 8(7). https://doi.org/10.29322/ijsrp.8.7.2018.p7978
Agustina Felisia. (2020) https://caraharian.com/kode-ascii-adalah.html#
Deny Nugroho Triwibowo. (2021) Enkripsi Pesan Menggunakan Algoritma Liniear Vol.3.No.3. http://doi.org/10./2928/biste.v313.5546
Devi Andriani (2017) Perancangan Aplikasi Penyandian Teks Dengan Menggunakan Algoritma Chiper Block Chaining. Jurnal Teknik Informatika Unika St. Thomas (JTIUST), Volume 02 Nomor 02, Desember 2017, ISSN : 2548-1916
Dropbox.(2021) https://experience.dropbox.com/id-id/resources/flowcharts
Dwi Latifatul Fajri (2022). https://katadata.co.id/agung/digital/62a8742d8c024/flowchart- adalah-bagan-alir-berikut-pengertian-dan-jenisnya
Hak Cipta © 2022 KK. https://www-crypto--it-net.translate.goog/eng/theory/pseudorandom- generator.html?_x_tr_sch=http&_x_tr_sl=en&_x_tr_tl=id&_x_tr_hl=id&_x_tr_pto=sc
Helmi Sahara.(2018) Implementasi Pengamanan Pesan Chatting Menggunakan Metode Vigenere Cipher dan Cipher Block Chaining. Jurnal Means. Vol 3. No.2, http://ejournal.ust.ac.id/indexphp/jurnal_Means
Kita Informatika (2018). http://www.kitainformatika.com/2018/07/algoritma-xor-chiper- untuk-mengatasi.html
Kurniawan (2017) Apa yang dimaksud dengan Inizialization Vector. https://www.dellenpedia.com/2017/07/apa-yang-dimaksud-dengan- initialization.html?m=1
Maya utami dewi,M.Kom (2021) Universitas Stekom. http://sistem-informasi- s1.stekom.ac.id/informasi/baca/JENIS-JENIS-KEAMANAN- DATA/15d1ee116284b85e5de3e00564518367fe994de7
Muhammad Robith Adani (2021) blog programming. https://www.sekawanmedia.co.id/blog/pengertian-kriptografi/
OMG. (2017) Pengertian Use Case Diagram. Unified Modeling Language
Rachmat Aulia, dkk.(2019) Penerapan Algoritma One Time Pad dan Liniear Congruential Generator Untuk Keamanan Pesan Teks. Jurnal Nasional Informatika dan Teknologi Jaringan.Vol.4 No.1. Avalible Online at : http://bit.ly/InfoTekjar
Sebastian Suhandinata, dkk. (2019) Analisa Performa Kriptografi Hybrid Algoritma Blowfish dan Algoritma RSA. Jurnal Teknologi Informasi, VI(01):1-10. Doi: http://doi.10.33330/jurteksi.v6i1.395
Waruwu, T.S.,dan Nasution,S. (2018) Pengembangan Keamanan Web Login Portal Dosen Menggunakan UML. Jurnal Mahajana Informasi, 3(1) 34-40.
Wikipedia.(2022) https://en-m- wikipediaorg.translate.goog/wiki/Linear_congruential_generator?_x_tr_sl=en&_x_tr_tl=id&_ x_tr_hl=id&_x_tr_pto=tc,sc
dok.com.https://text-id.123dok.com/document/ozll1rooz-pengertian-microsoft-visual- studio-2010-sejarah-singkat-microsoft-visual-studio-2010.html
DOI: http://dx.doi.org/10.30829/algoritma.v7i1.15409
Refbacks
- There are currently no refbacks.
Indexing:
|
Algoritma: Jurnal Ilmu Komputer dan Informatika
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.