Claim Missing Document
Check
Articles

Found 1 Documents
Search

Implementasi Algoritma TEA dan Pontifex Dalam Keamanan Data File Dokumen Saripah Aini
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (158.223 KB) | DOI: 10.30865/jurikom.v7i3.2180

Abstract

Data security is one of the most important aspects in information technology. With a high level of security, hopefully the information presented can be maintained its authenticity. In this final project a system that secures data and information stored on the computer from cryptanalysts is formed. The steps that the author did to make the process of forming the system include the stages of problem analysis, algorithm and flowchart along with modeling the structure of the program and design of the application interface, so that the application formed becomes easy to use and has optimal functions. By using TEA and pontifex algorithms which are secret key cryptographic algorithms, these problems can be overcome. The strength of this algorithm lies in the feistel network (including substitution operations, permutations and modular arithmetic) and delta numbers derived from the golden number.