Perancangan Aplikasi Enkripsi Kata Menggunakan Algoritma Playfair Cipher Berbasis Web

Muhammad Pristiwanto

Abstract


In this day and age information/messages are not only sent by courier or traditionally but have been adapted to technological developments. One phenomenon that occurs because it involves internet technology in sending messages and exchanging data is the issue of wiretapping, counterfeiting and even theft of messages. Cryptography has a very important role in the era of digitalization which aims to secure information. Information that is privacy can be avoided from third persons and the information to be submitted can be protected. On the basis of this idea, it is necessary to create a medium or application that can be used to perform the encryption process and description of the message so that the message sent can be received by the recipient in a state of guaranteed legitimacy. This study uses the cryptographic algorithm Playfair Cipher. From the results of testing the application built, in the process of encryption and description, it can be proven to guarantee the security and confidentiality of messages.

Full Text:

PDF

References


A. M. Hasibuan, “Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES Pada Smartphone,†MEANS (Media Inf. Anal. dan Sist., vol. 2, no. 1, pp. 29–35, Jun. 2017.

A. M. Mhd. Zulfansyuri Siambaton, “Modifikasi Algoritma Playfair Cipher Dengan Pengurutan Array Pada Matriks,†J. Ilmu Komput. dan Inform., vol. 02, no. April, pp. 66–71, 2018.

D. Ariyus, “Kriptografi keamanan data dan komunikasi,†Yogyakarta Graha Ilmu,

D. D. Santoso and P. Tarigan, “Penerapan Algoritma Playfair Cipher sebagai Penyandian Kunci Dalam Pengamanan File Teks dengan Algoritma Rijndael,†Pelita Inform. Budi Darma, vol. 17, pp. 59–64, 2018.

H. D. M. H. Hutahaean, “Aplikasi Pembelajaran Kriptograpi berbasis Mobile menggunakan Computer Assisted Instruction,†vol. 4, no. 1, pp. 2–5, 2019.

https://www.ssh.com/cryptography. [Accessed: 14-Dec-2019].

R. Munir, “Kriptografi,†Inform. Bandung, 2006.

T. Limbong et al., “The implementation of computer based instruction model on Gost Algorithm Cryptography Learning,†in IOP Conference Series: Materials Science and Engineering, 2018, vol. 420, no. 1, p. 12094.

Www.ssh.com, “Cryptography for Practitioners,†2019. [Online]. Available:




DOI: https://doi.org/10.36987/jcoins.v2i4.2963

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Hasil gambar untuk committee on publication ethics logo
 

Jurnal ini mengikuti pedoman dari Committee on Publication Ethics (COPE) dalam menghadapi semua aspek etika publikasi dan, khususnya, bagaimana menangani kasus penelitian dan kesalahan publikasi. Pernyataan ini menjelaskan etika perilaku semua pihak yang terlibat dalam proses penerbitan artikel di jurnal ini, termasuk Penulis, Pemimpin Redaksi, Dewan Redaksi, Mitra Bebestari, dan Penerbit (Akademi Kepolisian Republik Indonesia). Journal of Computer Science and Information System(JCoInS) berkomitmen untuk mengikuti praktik terbaik tentang masalah etika, kesalahan, dan pencabutan. Pencegahan malpraktek publikasi merupakan salah satu tanggung jawab penting dewan redaksi. Segala jenis perilaku tidak etis tidak dapat diterima, dan jurnal tidak mentolerir plagiarisme dalam bentuk apa pun.

 

Journal of Computer Science and Information System(JCoInS)
Journal URL: https://jurnal.ulb.ac.id/index.php/JCoInS/index
Journal DOI: 10.36987/jcoins
E-ISSN: 2747-2221

Alamat Redaksi :
Fakultas Sains dan Teknologi, Universitas Labuhanbatu
Gedung Fakultas Sains dan Teknologi,
Jalan Sisingamangaraja No.126 A KM 3.5 Aek Tapa, Bakaran Batu, Rantau Sel., Kabupaten Labuhan Batu, Sumatera Utara 21418