Evi Amelia Tarigan
STMIK Budi Darma Jln. Sisingamangaraja No. 338

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search

Perancangan Aplikasi Terenkripsi Dengan Menerapkan Metode Secret Sharing Asmuth Bloom Evi Amelia Tarigan
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (196.686 KB) | DOI: 10.30865/jurikom.v5i6.1211

Abstract

Conventional cryptographic algorithms cannot be applied to solve a plaintext (message) into several ciphertext pieces because conventional cryptographic algorithms can only produce a ciphertext from a plaintext (message) In this case, cryptography can be applied, namely Asmuth-Bloom's secret sharing. The methodology used to analyze and design the Asmuth-Bloom secret sharing cryptographic application software is the Waterfall methodology. This research is intended to produce a learning software that is able to display work processes from Asmuth-Bloom's secret sharing and applications from Asmuth-Bloom's secret sharing. The working procedure described by the software includes the process of forming keys, the process of forming shadows and the process of combining shadow.