IMPLEMENTASI ALGORITMA KRIPTOGRAFI PERMUTASI SUBSTITUSI XOR DINAMIS PADA PROSES DOWNLOAD FILE

Authors

  • Rancak Taufik Hidayat, Linda Mora

Abstract

Currently, Internet is growing so rapidly that almost anyone can use it in many areas of life. With internet users can quickly get the information they want. In the process of getting the data there are times when the data can be retrieved by others who are not eligible for example hackers. Therefore we need a method that can be used to secure our data that can not be retrieved by unauthorized parties. One method I use to secure data is cryptography using permutation substiutsi xor (PSX) dynamically during the process of getting data from a computer server of an agency. The encryption process is done on the server side during the process of downloading the desired file and dsimpan takes place on the client computer. To open the data required applications installed on the client computer. So that not everyone can use it and the result is that data can be obtained safely.

References

Alfred Menezes, Handbook Of Applied

Cryptography, CRC Press, New York,

Andi Kurniawan, Belajar Sendiri Microsoft

Active Server Pages, Elex Media

Komputindo, Jakarta, 2000.

Antony Pranata, Pemrograman Borland

Delphi, Penerbit Andi, Yogyakarta, 1997.

Bruce Schneier, Applied Cryptography

Protocols Algorithm and Source In C, John

Wiley And Sons, Second Edition, USA,

D.S. Steve, Mengenal Teknik-teknik

Enkripsi Data, Mikrodata volume 1, seri

, hal 45, Januari 1997.

Dipa Pamitrapati, Krisdianto Siahaan, Trik

Pemrograman Delphi, Elex Media

Komputindo, Jakarta, 2000.

Dorothy Elizabeth, Robling Denning,

Cryptography and Data Security, Addison-

Wesley Publishing Company, Purdue

University, January 1982.

, Steve Teixeria, Xavier Pacheco, Delphi 5

Developer’s Guide, Sams Publishing,

USA, 1999.

Setiaji, Bayu. 2015, Analisis dan

Implementasi Algoritma Kriptografi Kunci

Publik RSA dan LUC Untuk Penyandian

Data, Jurnal Ilmiah DASI, Vol. 16 No. 3

September 2015, hlm 27 – 36.

Agung, Halim dan Budiman. 2015,

Implementasi Affine Chifer dan RC4 Pada

Enkripsi File Tunggal, Prosiding SNATIF

ke-2 Tahun 2015, ISSN : 978-602-1180-

-1

Sitinjak, Suriski, Fauziah, Yuli dan

Juwairiah. 2010, Aplikasi Kriptografi File

Menggunakan Algoritma Blowfish,

Seminar Nasional Informatika (semnasIF)

, ISSN : 1979-2328

Downloads

Issue

Section

Articles