Penyandian File Word Berdasarkan Algoritma Rivest Code 5 (RC5)

  • Prabowo W
  • Harahap A
  • Ismadiah R
N/ACitations
Citations of this article
25Readers
Mendeley users who have this article in their library.

Abstract

Nowadays, important data in the form of word files have been widely used. But there are still few who apply security techniques to the important files. Files that are confidential or important, if they fall into the hands of others may be misused or manipulated for certain purposes. The existence of document security applications built on cryptographic algorithms is one solution to solve the above problems. Cryptographic techniques secure a data or important files by encoding the data into a cipher that is difficult to understand again by others. The RC5 algorithm is one of the cryptographic technique algorithms that can be used to encode text from word files based on the RC5 algorithm so that it can improve the expression of important and confidential word files.

Cite

CITATION STYLE

APA

Prabowo, W. A., Harahap, A. F., & Ismadiah, R. (2018). Penyandian File Word Berdasarkan Algoritma Rivest Code 5 (RC5). J-SAKTI (Jurnal Sains Komputer Dan Informatika), 2(1), 47. https://doi.org/10.30645/j-sakti.v2i1.55

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free