Abstract

Security of data in a computer is needed to protect critical data and information from other parties. One way to protect data is to apply the science of cryptography to perform data encryption. There are wide variety of algorithms used for encryption of data, this study used a one-time pad algorithm for encrypting data. Algorithm One Time Pad uses the same key in the encryption process and a decryption of the data. An encrypted data will be transformed into cipher text so that the only person who has the key can open that data. Therefore, analysis will be done for an application that implements a one-time pad algorithm for encrypting data. The application that implements the one time pad algorithm can help users to store data securely.

Highlights

  • Security of data in a computer is very important to protect the data from other parties that do not have the authority to determine the content of the data [1]

  • The advantage of the one-time pad algorithm is to perform the encryption process and a decryption of each character plaintextnya use each character in the key

  • The results of byte values obtained through XOR encryption between each plaintext byte and byte key value and the password hash value, the creation of the software, which need to be considered in data decryption by using One-time pad (OTP) algorithm that is a random number generator and key word

Read more

Summary

Introduction

Security of data in a computer is very important to protect the data from other parties that do not have the authority to determine the content of the data [1]. To unlock the data that is already widely available password receipts of software that we can use. Another way that is used for encoding is to use the science of cryptography is to encrypt the data so that the data can not be read, deleted and changed by others[4]. Science of cryptography has been applied since ancient times to the present in accordance with technological developments. One Time Pad This algorithm uses the same key to encrypt and a decryption of the data. One Time Pad This algorithm uses the same key to encrypt and a decryption of the data. [1]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call