Abstract

Data security is important in the implementation of information technology, especially in the field of computers, which allows thousands of people and computers around the world to be connected in a virtual world known as cyberspace or the internet. This can create new challenges and demands for the availability of a data security system that is as sophisticated as the advances in computer technology itself. In cryptography, data sent over the network will be disguised in such a way that even if the data can be read by third parties, it should not be understood by unauthorized parties. Data to be sent and has not been encrypted which produces ChipperTtext. The implementation of the transposition algorithm for securing data flowing in the Local Area Network (LAN), the transposition process changes the arrangement of letters from the source text (plaintext), with a column transposition cipher, to obtain the words in a barred manner. In the transposition cipher, the plaintext is the same, but the sequence is changed. . This algorithm transposes a series of characters in the text. Another name for this method is permutation because transpose each character in the text is the same as permutating the characters so that this application generates encrypted data on the network stream and returns it to plaintext at the final destination. So that it can be ensured that the information and data sent to other parties are safe from unauthorized parties.

Highlights

  • Perkembangan pengolahan data dan informasi yang begitu pesat saat ini, keamanan data menjadi hal yang sangat penting untuk melakukan pengiriman data dan komunikasi data lainnya

  • Data security is important in the implementation of information technology

  • which allows thousands of people and computers around the world to be connected in a virtual world known as cyberspace

Read more

Summary

Enkripsi Kunci Rahasia

Secret-key cryptography kadang disebut sebagai symmetric cryptography merupakan bentuk kryptografi yang lebih tradisional, dimana sebuah kunci tunggal dapat digunakan untuk mengenkrip dan mendekrip pesan. Teknik yang paling umum dalam secret-key cryptography adalah block ciphers, stream ciphers, dan message authentication codes. B. Analisis, pada tahap ini akan dilakukan analisis permasalahan dan kebutuhan sistem yaitu Menganalisa Algoritma Cipher Transposisi serta teknik-teknik yang digunakan. Metode yang berbeda didapat dengan adanya permutasi singkat untuk hurufhuruf plaintext.Teknik ini disebut sebagai transposition cipher.Teknik yang paling sederhana adalah teknik rail fence, dimana plaintext ditulis dengan urutan kolom dan dibaca sebagai urutan baris. Metode ini cukup mudah dipecahkan.Skema yang lebih kompleks adalah dengan menuliskan pesan sebagai sebuah kotak, baris demi baris, dan membaca pesan itu kolom demi kolom, tetapi dengan permutasi dari urutan kolom.

Chippertex t
Socket Pada Server
Server dan Database
Client Melakukan REQUEST Berupa login dan permintaan data
List Data Pegawai
Keamanan Sistem Informasi Pada Usaha Kecil Dan
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.