SISTEM KEAMANAN DATA DENGAN METODE CRYPTOGRAPHY
Sari
Abstract
For data protection is important enough there is no other way but to use a special program
protection / encryption of data. When this has been a lot of outstanding special program data
protection either freeware, shareware, and commercial is very good. In general, these programs
not only provide a single method alone, but some kind so that we can choose who we think is the
most secure. One method is public key encryption criptography. Cryptography is a science or art
of secure messaging and performed by criptographer. Criptography Public Key cryptography is
done by combining the two related keys called a key pair of public and private keys. Both keys
are created at the same time and relate it mathematically.
Semetrik algorithm is a type of encryption algorithms are the most common. This algorithm is
called symmetric because the same key used for encryption and decryption. Unlike the keys used
in public key algorithms, symmetric key that is used on keys typically change often. When
compared with the public key algorithms, symmetric key algorithms are very fast and therefore
are more suitable when used to encrypt the data is very large. Modern cryptographic protocols
that incorporate many current public key algorithm with a symmetric algorithm to obtain the
advantages of each algorithm.
Teks Lengkap:
PDFReferensi
http://www.tedi-h.com/papers/p
kripto.html, Tedi Hariyanto, “Pengenalan
Kriptografi”, edisi Juni 1999.
http://www.budi.insan.co.id/courses/el695
http://www.criptography.com
http://www.infokomputer.com/arsip/interne
t/0698/cakra/cakrawa1.shtml
Budi
Sukmawan, “Keamanan Data dan Metode
Enkripsi”, edisi Jan. 1998.
http://www.ilmukomputer.com/populer/afs/
afs-security.pdf,
Phil Zimmerman,“Sekilas Tentang
Enkripsi”,NeoTek, April 2002.
Budi Raharjo,
“ Keamanan system
informasi Berbasis Internet “ PT Insan
Infonesia – Bandung & PT INDOCISC –
Jakarta, 2002
http://www.tedi-h.com/papers/p kripto.html
http://www.budi.insan.co.id/courses/el695
http://www.criptography.com
DOI: https://doi.org/10.35968/jmm.v4i2.585
Refbacks
- Saat ini tidak ada refbacks.
Indexed by: