Claim Missing Document
Check
Articles

Found 3 Documents
Search

Perancangan Aplikasi Penyandian Pesan Chat Client dan Server Berdasarkan Algoritma Spritz Prabowo, Widodo Arif; Mesran, Mesran; Hutagalung, Siti Nurhabibah
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (184.88 KB) | DOI: 10.30865/jurikom.v7i3.2126

Abstract

The development of the computer world in the current era, the need to secure messages / data and for security in communication is very important. The author conducted this research aims to secure chat messages from client to server and vice versa. With this cryptographic technique used to convert chat messages into the form of certain codes with the intention that chat messages cannot be seen / read by anyone except people who have the right to read the chat messages. In this study, the Client and Server Message Chat encoding application is designed which implements the workings of encryption and decryption using the Spritz Algorithm. The results of this study are chat client and server message encoding applications with the Spritz algorithm that can encode confidential chat messages. This application was created using Microsoft Visual Basic 2008
Penyandian File Word Berdasarkan Algoritma Rivest Code 5 (RC5) Prabowo, Widodo Arif; Harahap, Annisa Fitri; Ismadiah, Ridha
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (641.849 KB) | DOI: 10.30645/j-sakti.v2i1.55

Abstract

Nowadays, important data in the form of word files have been widely used. But there are still few who apply security techniques to the important files. Files that are confidential or important, if they fall into the hands of others may be misused or manipulated for certain purposes. The existence of document security applications built on cryptographic algorithms is one solution to solve the above problems. Cryptographic techniques secure a data or important files by encoding the data into a cipher that is difficult to understand again by others. The RC5 algorithm is one of the cryptographic technique algorithms that can be used to encode text from word files based on the RC5 algorithm so that it can improve the expression of important and confidential word files.
Penyandian File Word Berdasarkan Algoritma Rivest Code 5 (RC5) Prabowo, Widodo Arif; Harahap, Annisa Fitri; Ismadiah, Ridha
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v2i1.55

Abstract

Nowadays, important data in the form of word files have been widely used. But there are still few who apply security techniques to the important files. Files that are confidential or important, if they fall into the hands of others may be misused or manipulated for certain purposes. The existence of document security applications built on cryptographic algorithms is one solution to solve the above problems. Cryptographic techniques secure a data or important files by encoding the data into a cipher that is difficult to understand again by others. The RC5 algorithm is one of the cryptographic technique algorithms that can be used to encode text from word files based on the RC5 algorithm so that it can improve the expression of important and confidential word files.