PENGAMANAN FILE SUARA MENGGUNAKAN KRIPTOGRAFI ALGORITMA RIJNDAEL DENGAN PROSES ENKRIPSI DAN DEKRIPSI
DOI:
https://doi.org/10.29103/techsi.v11i3.1967Abstract
Pada era ini, perkembangan dan kemajuan dari teknologi informasi semakin meningkat dengan pesat. Sehingga membuat lebih mengerti dalam bidang teknologi. Dengan semakin majunya teknologi saat ini, kita dapat membuat sebuah program untuk mengamankan file seperti : file gambar, file dokumen, file suara, dan lain-lain. Kita dapat mengamankan file kita dengan menggunakan kriptografi algoritma rijndael. Dengan menggunakan algoritma ini kita dapat mengamankan file menggunakan proses enkripsi dan dekripsi.
Kata kunci: pengamanan data, kriptografi, algoritma rijndael, enkripsi, dekripsi
References
Biham, E (2004). Journal of Cryptography v 7.
Davies, DW dan Murphy, S (2005). Pairs and Triplets of DES S-Boxes, Journal of Cryptology version 8.
Hansfeld,Nils.TheCryptographyTutorial.http://www.antilles.k12.vi.us/math/ Akses: November 2009.
Schneier, Bruce. (1996). Applied Cryptography, Second Edition : Protocols, Algorthms, and Source Code in C. John Wiley & Sons, Inc.
Alim, Z., & Cancer, Y. (2016). Meningkatkan keamanan data cloud computing menggunakan algoritma rijndael. Jurnal TI , Vol. V No 1, 2.
Ratih, 2010. Tugas Akhir : Studi dan Perbandingan Penggunaan Kriptografi Kunci Simetri dan Asimetri pada Telepon Selular, Institute Teknologi Bandung.
Kromodimoeljo, S., 2009. Teori & Aplikasi Kriptografi, Jakarta: SPK IT Consulting.
Stallings, William. (2005). Cryptography and Network Security Principles and Practices, Fourth Edition. Prentice Hall.
Federal Information Processing Standards Publication 197, (2001). Announcing the Advanced Encryption Standard (AES).
Downloads
Published
Issue
Section
License
Authors retain copyright and grant the journal right of first publication and this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 that allows others to share the work with an acknowledgement of the works authorship and initial publication in this journal.
All articles in this journal may be disseminated by listing valid sources and the title of the article should not be omitted. The content of the article is liable to the author.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
In the dissemination of articles by the author must declare the TECHSI Journal as the first party to publish the article.
