Enkripsi Surat Elektronik Menggunakan Metode XXTEA
Abstract
Keywords
Full Text:
PDFReferences
R. E. Blahut, Cryptography and secure communication, vol. 9781107014275. 2012.
H. M. Jogiyanto, Analisis & Disain Sistem Informasi Pendekatan Terstruktur Teori Dan Praktek Aplikasi Bisnis, 2nd ed. Yogyakarta: Penerbit Andi, 2015.
M. Ihwani, “Model Keamanan Informasi Berbasis Digital Signature Dengan Algoritma Rsa,” CESSJournal Comput. Eng. Syst. Sci., vol. 1, no. 1, pp. 15–20, 2016.
H. Delfs and H. Knebl, Introduction to Cryptography. 2007.
L. Van Houtven, “Crypto 101,” p. 243, 2014.
O. K. Sulaiman, M. Ihwani, and S. F. Rizki, “MODEL KEAMANAN INFORMASI BERBASIS TANDA TANGAN DIGITAL DENGAN DATA ENCRYPTION STANDARD (DES) ALGORITHM,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 1, no. 1, pp. 14–19, Sep. 2016.
A. Widarma, “Kombinasi Algoritma AES, RC4, dan Elgamal dalam Skema Hybrid untuk Keamanan Data,” J. Comput. Eng. Syst. Sci., vol. 1, no. 1, pp. 1–8, 2016.
M. Natsir, “Pengembangan Prototype Sistem Kriptografi Untuk Enkripsi Dan Dekripsi Data Office Menggunakan Metode Blowfish Dengan Bahasa Pemrograman Java,” J. Sist. Inf., vol. 6, pp. 87–105, 2017.
H. Nasution, P. Studi, T. Informatika, and U. Tanjungpura, “Implementasi Algoritma Kriptografi XXTEA untuk Enkripsi dan Dekripsi Query Database pada Aplikasi Online Test ( Studi Kasus : SMK Immanuel Pontianak ),” vol. 1, no. 1, pp. 1–5, 2017.
J. HOLDEN, The Mathematics of Secrets. Cryptography from Caesar Ciphers to Digital Encryption. 2017.
DOI: https://doi.org/10.24114/cess.v4i1.12354
Article Metrics
Abstract view : 758 timesPDF - 543 times
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 4.0 International License.
CESS (Journal of Computer Engineering, System and Science)
CESS (Journal of Computer Engineering, System and Science) is licensed under a Creative Commons Attribution 4.0 International License