Warning: htmlspecialchars() expects parameter 1 to be string, array given in /var/www/journal/plugins/generic/googleScholar/GoogleScholarPlugin.inc.php on line 99
Notice: Array to string conversion in /var/www/journal/lib/pkp/classes/i18n/LocaleFile.inc.php on line 102
PENERAPAN ALGORITMA DATA ENCRYPTION STANDARD PADA PERANCANGAN APLIKASI KRIPTOGRAFI BERBASIS WEB PADA CYBER DEFENCE
| INTEKSIS
PENERAPAN ALGORITMA DATA ENCRYPTION STANDARD PADA PERANCANGAN APLIKASI KRIPTOGRAFI BERBASIS WEB PADA CYBER DEFENCE
Authors
Tony Darmanto
Riyadi J. Iskandar
Soebandi - -
Abstract
In this era of globalization, many organizations or users who use the internet as a medium of communication or as a tool for sending messages. In the development of many emerging parties intercepting confidential data that is being transmitted or stored confidential data. Currently the security of the data stored in the computer and the data is being transmitted has become an absolute requirement in the Cyber Defence. It is strongly associated with the importance of these data for those interested. If data have been intercepted by unauthorized parties, it can be detrimental. The method used in this research is to study the literature related to the problems. Moreover, the authors use the Unified Modeling Language (UML) to help in the design and use Dreamweaver 8.0 and MySQL in making applications. This research is an application that can be used to secure documents will be stored or shipped. The data used in the encryption process is a .txt file type or user can write its own data to be used in the encryption process. The results of encryption and decryption process will be stored in a .txt file type that will be directly stored in a computer storage medium. The key used in the encryption process, consisting of 8 characters in the process will produce 16 internal key. Plaintext cryptographic process will process up to 8 characters, which will be played 16 times. The conclusion that can be derived from this study are certain parties can be assisted in the process of securing the document. With this application, some may encode documents to be stored or to be sent. Researchers expect further development so that more help those in need. DES algorithm can be replaced by using a 56-bit computing a triple DES algorithm with a key length of 128-bits.