Kombinasi Algoritma Cipher Block Chaining dan Triangle Chain Cipher dalam Penyandian File Text
DOI:
https://doi.org/10.47065/bulletincsr.v2i2.155Keywords:
Cryptography; Security; Text Files; Cipher Block Chaining; Triangle Block CipherAbstract
Currently the use of information technology as a medium of information exchange is growing very widely. Various types of information such as text, images, sound and video can be converted into digital media that allows it to be reproduced or transmitted through various media. One of them is the internet, through the internet we can easily exchange information with other people in various places. However, there are times when information/messages are confidential, where no other party may know the contents of this information other than the sender and recipient. So we need a security against the message. Cryptography is a technique and art to encode messages or information in a medium, such as text, images, audio or video which aims to avoid suspicion from unauthorized people. For that we need a software that can encode confidential information in a text file. However, in hiding messages in text files using cryptography alone is not necessarily safe, so a useful algorithm is needed to improve security, therefore Cipher Block Chaining and Triangle Chain Cipher algorithms are needed. The research objective is to apply the Cipher Block Chaining and Triangle Chain Cipher algorithms for text file encoding applications. This is necessary because it often happens that the text message sent is a secret message that should not be known to just anyone. Block Chaining Ciphers and Triangle Chain Ciphers are useful algorithms to provide an advantage in terms of increased security in text files.
Downloads
References
D. Salomon, Data Compression The Complete Reference FourthEdition, vol. 53, no. 9. 2007.
E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab. Yogyakarta: CV.ANDI OFFSET, 2015.
I. Kurniawan, “Implementasi dan Studi Perbandingan Steganografi pada File Audio WAVE Menggunakan Teknik Low-Bit Encoding dengan Teknik End Of File,” J. Informatics Technol., vol. 2, no. 3, pp. 0–11, 2013.
F. C. Venna, “Implementasi steganografi audio pada file wav dengan metode redundant pattern encoding (rpe) berbasis android,” 2019.
U. S. Utara, U. S. Utara, and U. S. Utara, “Analisis Perbandingan Kinerja Algoritma Start-Step-Stop Code dan Gopala-Hemachandra Code 2 ( GH-2 ( n )) pada Kompresi File Teks,” vol. 2, 2019.
J. N. Denenberg, E. D. Weinberger, and M. L. Gordon, “DATA COMPRESSION METHOD FOR USE IN A COMPUTERIZED INFORMATIONAL AND TRANSACTIONAL NETWORK,” vol. 32, N, 1996.
O. K. Sulaiman, M. Ihwani, and S. F. Rizki, “MODEL KEAMANAN INFORMASI BERBASIS TANDA TANGAN DIGITAL DENGAN DATA ENCRYPTION STANDARD (DES) ALGORITHM,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 1, no. 1, pp. 14–19, Sep. 2016.
M. I. Dzulhaq and A. A. Andayani, “Aplikasi Kompresi File Dengan metode Lempel-Ziv-Welchof,” J. Sisfotek Glob., vol. 4, no. 1, pp. 1–4, 2014.
C. D. A. N. Root, “Analisa implementasi aplikasi keamanan file audio wav dengan menerapkan algoritma beaufort cipher dan root 13,” vol. 18, pp. 372–379, 2019.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Kombinasi Algoritma Cipher Block Chaining dan Triangle Chain Cipher dalam Penyandian File Text
ARTICLE HISTORY
How to Cite
Issue
Section
Copyright (c) 2022 Nurul Hapifah Purba

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).