Claim Missing Document
Check
Articles

Found 3 Documents
Search

Implementasi Metode GOST(Government Standard) dan LSB-1(Least Significant Bit) Untuk Mengamankan Teks Diana, Mia
TIN: Terapan Informatika Nusantara Vol 1 No 7 (2020): Desember 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Securing text data is one of the activities carried out so that the text of an information is kept confidential so that it cannot be known by others except those who are entitled to it. One technique that can be done to optimize the security of text data is to combine cryptographic techniques with the steganography technique. Cryptographic techniques function to encode text data that is kept secret through the encryption process. While the steganography technique serves to hide (embedding) encrypted text data into a media such as image, video, audio. This study describes the process of combining cryptographic techniques and steganography techniques in securing sent text. Cryptographic techniques are used to encode secret messages based on the GOST (Government Standard) method and the steganography technique is used to hide encrypted text into a digital image based on the LSB-1 (Least significant bit-1) algorithm. In order to make the process easier, a secret text security application was built using Visual Basic 2008 programming language
Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS Diana, Mia; Zebua, Taronisokhi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (727.978 KB) | DOI: 10.30645/j-sakti.v2i1.52

Abstract

The key in the cryptography algorithm is a very important role in the process of encryption and decryption. The more random key numbers are used, the more random the ciphers are generated. The RC4 algorithm and the Beaufort cipher are algorithms of cryptographic techniques. The RC4 algorithm has advantages in generating random keys, whereas Beaufort ciphers have a disadvantage in terms of the number of keys used too much. This research describes how to optimize key formation in Beaufort algorithm by utilizing the key generation process on the RC4 algorithm which is implemented on encoding SMS which until now has not been point-to-point (not directly sent to destination). The results of this study provide convenience for users in the process of generating encryption and decryption keys and generate SMS cipher more random and difficult to understand by others.
Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS Diana, Mia; Zebua, Taronisokhi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v2i1.52

Abstract

The key in the cryptography algorithm is a very important role in the process of encryption and decryption. The more random key numbers are used, the more random the ciphers are generated. The RC4 algorithm and the Beaufort cipher are algorithms of cryptographic techniques. The RC4 algorithm has advantages in generating random keys, whereas Beaufort ciphers have a disadvantage in terms of the number of keys used too much. This research describes how to optimize key formation in Beaufort algorithm by utilizing the key generation process on the RC4 algorithm which is implemented on encoding SMS which until now has not been point-to-point (not directly sent to destination). The results of this study provide convenience for users in the process of generating encryption and decryption keys and generate SMS cipher more random and difficult to understand by others.