SISTEM KEAMANAN DATA DENGAN METODE CRYPTOGRAPHY

Peniarsih Peniarsih

Sari


Abstract
For data protection is important enough there is no other way but to use a special program
protection / encryption of data. When this has been a lot of outstanding special program data
protection either freeware, shareware, and commercial is very good. In general, these programs
not only provide a single method alone, but some kind so that we can choose who we think is the
most secure. One method is public key encryption criptography. Cryptography is a science or art
of secure messaging and performed by criptographer. Criptography Public Key cryptography is
done by combining the two related keys called a key pair of public and private keys. Both keys
are created at the same time and relate it mathematically.
Semetrik algorithm is a type of encryption algorithms are the most common. This algorithm is
called symmetric because the same key used for encryption and decryption. Unlike the keys used
in public key algorithms, symmetric key that is used on keys typically change often. When
compared with the public key algorithms, symmetric key algorithms are very fast and therefore
are more suitable when used to encrypt the data is very large. Modern cryptographic protocols
that incorporate many current public key algorithm with a symmetric algorithm to obtain the
advantages of each algorithm.


Teks Lengkap:

PDF

Referensi


http://www.tedi-h.com/papers/p

kripto.html, Tedi Hariyanto, “Pengenalan

Kriptografi”, edisi Juni 1999.

http://www.budi.insan.co.id/courses/el695

http://www.criptography.com

http://www.infokomputer.com/arsip/interne

t/0698/cakra/cakrawa1.shtml

Budi

Sukmawan, “Keamanan Data dan Metode

Enkripsi”, edisi Jan. 1998.

http://www.ilmukomputer.com/populer/afs/

afs-security.pdf,

Phil Zimmerman,“Sekilas Tentang

Enkripsi”,NeoTek, April 2002.

Budi Raharjo,

“ Keamanan system

informasi Berbasis Internet “ PT Insan

Infonesia – Bandung & PT INDOCISC –

Jakarta, 2002

http://www.tedi-h.com/papers/p kripto.html

http://www.budi.insan.co.id/courses/el695

http://www.criptography.com




DOI: https://doi.org/10.35968/jmm.v4i2.585

Refbacks

  • Saat ini tidak ada refbacks.


Indexed by: