Implementasi Algoritma TEA dan Pontifex Dalam Keamanan Data File Dokumen

  • Aini S
N/ACitations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

Data security is one of the most important aspects in information technology. With a high level of security, hopefully the information presented can be maintained its authenticity. In this final project a system that secures data and information stored on the computer from cryptanalysts is formed. The steps that the author did to make the process of forming the system include the stages of problem analysis, algorithm and flowchart along with modeling the structure of the program and design of the application interface, so that the application formed becomes easy to use and has optimal functions. By using TEA and pontifex algorithms which are secret key cryptographic algorithms, these problems can be overcome. The strength of this algorithm lies in the feistel network (including substitution operations, permutations and modular arithmetic) and delta numbers derived from the golden number.

Cite

CITATION STYLE

APA

Aini, S. (2020). Implementasi Algoritma TEA dan Pontifex Dalam Keamanan Data File Dokumen. JURIKOM (Jurnal Riset Komputer), 7(3), 409. https://doi.org/10.30865/jurikom.v7i3.2180

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free