PENERAPAN ALGORITMA RC4 PADA OPERASI XOR UNTUK KEAMANAN PESAN PADA SMARTPHONE BERBASIS WEB

Muryan Awaludin

Sari


Utilization of cryptography as the encryption and decryption can be used to secure messages or the data that is important and valuable. A message can be encrypted or into ciphertext using a key and can be safely exchanged without having to worry about the confidentiality of the contents of the message. Decryption key will be to process the encrypted message into plaintext or the original message. XOR operation algorithm is computationally easy to use, but the process XOR algorithm is weak and not strong. To cover up weaknesses reviews these use RC4 algorithm (Rivers Code 4), because RC4 algorithm process is fast and strong . The results of this application in the form of a software is Able to encrypt and decrypt the message form and to generate a unique security key based encrypted message, and provide an accurate report on the presence or absence of changes to the contents of the message, The implementation of the RC4 encryption and decryption process on the website based smartphone helps users in maintaining the security and confidentiality of information storage that is sent and received. The results of this study so that the user can secure messages to be sent to the recipient.


Teks Lengkap:

PDF

Referensi


Sarkar, Santanu. Proving Empirical KeyCorelations in RC4. Information processing letters, 2014. A.Roos,A class of weak keys in the RC4 stream cipher.Twoposts in sci.crypt http://marcel.wanda.ch/Archive/WeakKe ys, 1995. Jindal, Poonam & brahmjit, Singh. RC4 Encryption-A Literature Survey. International Conference on Information and Communication Technologies (ICICT 2014). Chen & Miaji, Novel strategies for searching RC4 key collisions, Computers and Mathematics with Applications, 2013 P. Sepehrdad, S. Vaudenay, M. Vuagnoux, Statistical attack on RC4, in: K. Paterson (Ed.), Eurocrypt 2011, in: LNCS, vol. 6632, Springer, Heidelberg, 2011, pp. 343–363. P. Sepehrdad, S. Vaudenay, M. Vuagnoux, Discovery and exploitation of new biases in RC4, in: A. Biryukov, G. Gong, D. Stinson (Eds.), SAC2010, in: LNCS, vol. 6544, Springer, Heidelberg, 2011, pp. 74–91. M. Subhamoy, P. Goutam, S. Sourav, Attack on broadcast RC4 revisited, in: FSE2011, in: LNCS, vol. 6733, Springer, Heidelberg, 2011, pp. 199–217. J. Chen, A. Miyaji, How to find short RC4 colliding key pairs, in: The 14th Information Security Conference, ISC 2011, in: Lecture Notes in ComputerScience, vol. 7001, SpringerVerlag, 2011, pp. 32–46. Ariyus, Dony. Kriptografi Keamanan Data dan Komunikasi. Graha Ilmu. Yogyakarta. 2006. B.N. Marbun. Kamus Manajemen. Jakarta. Pustaka Sinar Harapan. 2003. Cangara, Hafied. Pengantar Ilmu Komunikasi. Raja Grafindo Persada

(Rajawali Perss). Jakarta. 2012. Dhanta, Rizky. Pengantar Ilmu Komputer. Surabaya. INDAH. 2009. Effendy, Onong Uchjana. Kamus Komunikasi. PT. Mandar Maju. Bandung. 1989. Firdaus. 7 Jam Belajar Interaktif PHP & MySQL dengan Dreamwever. Palembang. Maxikom. 2007. HM, Jogiyanto, Analisis dan Desain Sistem Informasi : Pendekatan Terstruktur Teori dan Praktek Aplikasi Bisnis, Yogyakarta. ANDI Yogyakarta. 1999. Kadir, Abdul, Algoritma & Pemprograman Menggunakan Java. Yogyakarta. Andi Yogyakarta. 2012. Kromodimoeljo, Sentot. Teori Dan Aplikasi Kriptografi. SPK IT Consulting. 2009. Nugroho, Adi. Rekayasa Perangkat Lunak Menggunakan UML dan Java. Yogyakarta. 2010. Nugroho, Bunafit. Membuat Aplikasi Database SQL Server dengan Visual Basic 6,0. Gava Media, Yogyakarta. 2007. Nugroho, Bunafit. PHP dan MySQL dengan editor Dreamweaver MX. ANDI Yogyakarta. 2004. Prasetyo, Didik Dwi. 101 Tip dan Trik Pemrograman PHP. Buku kedua. Jakarta: PT Elex Media Komputindo. 2008. Siallagan, Sariadin. Pemrograman Java. Yogyakarta. Andi Yogyakarta. 2009. Simarmata, Janner. Rekayasa Perangkat Lunak . Yogyakarta. Andi Offset. 2010. Susanto, Azhar. Sistem Informasi Manajemen. Bandung. Linggar Jaya. 2004. Syafrizal, Melwin. Pengantar Jaringan computer. Yogyakarta. Andi Yogyakarta 2005. Widodo, Prabowo.P,Dkk. Pemodelan Sistem Berorientasi Obyek Dengan UML. Graha ilmu. Yogyakarta. 2011.




DOI: https://doi.org/10.35968/jsi.v4i1.71

Refbacks

  • Saat ini tidak ada refbacks.


Indexed by: