Kombinasi Algoritma Cipher Block Chaining dan Triangle Chain Cipher dalam Penyandian File Text


Authors

  • Nurul Hapifah Purba Universitas Budi Darma, Medan, Indonesia

DOI:

https://doi.org/10.47065/bulletincsr.v2i2.155

Keywords:

Cryptography; Security; Text Files; Cipher Block Chaining; Triangle Block Cipher

Abstract

Currently the use of information technology as a medium of information exchange is growing very widely. Various types of information such as text, images, sound and video can be converted into digital media that allows it to be reproduced or transmitted through various media. One of them is the internet, through the internet we can easily exchange information with other people in various places. However, there are times when information/messages are confidential, where no other party may know the contents of this information other than the sender and recipient. So we need a security against the message. Cryptography is a technique and art to encode messages or information in a medium, such as text, images, audio or video which aims to avoid suspicion from unauthorized people. For that we need a software that can encode confidential information in a text file. However, in hiding messages in text files using cryptography alone is not necessarily safe, so a useful algorithm is needed to improve security, therefore Cipher Block Chaining and Triangle Chain Cipher algorithms are needed. The research objective is to apply the Cipher Block Chaining and Triangle Chain Cipher algorithms for text file encoding applications. This is necessary because it often happens that the text message sent is a secret message that should not be known to just anyone. Block Chaining Ciphers and Triangle Chain Ciphers are useful algorithms to provide an advantage in terms of increased security in text files.

Downloads

Download data is not yet available.

References

D. Salomon, Data Compression The Complete Reference FourthEdition, vol. 53, no. 9. 2007.

E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab. Yogyakarta: CV.ANDI OFFSET, 2015.

I. Kurniawan, “Implementasi dan Studi Perbandingan Steganografi pada File Audio WAVE Menggunakan Teknik Low-Bit Encoding dengan Teknik End Of File,” J. Informatics Technol., vol. 2, no. 3, pp. 0–11, 2013.

F. C. Venna, “Implementasi steganografi audio pada file wav dengan metode redundant pattern encoding (rpe) berbasis android,” 2019.

U. S. Utara, U. S. Utara, and U. S. Utara, “Analisis Perbandingan Kinerja Algoritma Start-Step-Stop Code dan Gopala-Hemachandra Code 2 ( GH-2 ( n )) pada Kompresi File Teks,” vol. 2, 2019.

J. N. Denenberg, E. D. Weinberger, and M. L. Gordon, “DATA COMPRESSION METHOD FOR USE IN A COMPUTERIZED INFORMATIONAL AND TRANSACTIONAL NETWORK,” vol. 32, N, 1996.

O. K. Sulaiman, M. Ihwani, and S. F. Rizki, “MODEL KEAMANAN INFORMASI BERBASIS TANDA TANGAN DIGITAL DENGAN DATA ENCRYPTION STANDARD (DES) ALGORITHM,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 1, no. 1, pp. 14–19, Sep. 2016.

M. I. Dzulhaq and A. A. Andayani, “Aplikasi Kompresi File Dengan metode Lempel-Ziv-Welchof,” J. Sisfotek Glob., vol. 4, no. 1, pp. 1–4, 2014.

C. D. A. N. Root, “Analisa implementasi aplikasi keamanan file audio wav dengan menerapkan algoritma beaufort cipher dan root 13,” vol. 18, pp. 372–379, 2019.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Kombinasi Algoritma Cipher Block Chaining dan Triangle Chain Cipher dalam Penyandian File Text

Dimensions Badge

ARTICLE HISTORY

Published: 2022-04-23

Abstract View: 356 times
PDF Download: 415 times

How to Cite

Hapifah Purba, N. (2022). Kombinasi Algoritma Cipher Block Chaining dan Triangle Chain Cipher dalam Penyandian File Text. Bulletin of Computer Science Research, 2(2), 47-52. https://doi.org/10.47065/bulletincsr.v2i2.155

Issue

Section

Articles