Penerapan Metode Elgamal Untuk Mengamankan Teks Pada File Dokumen Word


Authors

  • Abdul Halim Hasugian Universitas Islam Sumatera Utara, Medan, Indonesia
  • Raissa Amanda Putri Universitas Islam Sumatera Utara, Medan, Indonesia
  • Annisa Shafira Zuhri Universitas Islam Sumatera Utara, Medan, Indonesia

DOI:

https://doi.org/10.30865/klik.v4i2.1277

Keywords:

Electrical properties; DSSC Performance; Au nanoparticles; Four point probe

Abstract

Text that contains a lot of characters always causes problems with storage media and time speed during data transmission. Text files are files that contain information in text form. data originating from word processing documents, numbers used in calculations, names and addresses in databases are examples of input text data consisting of characters, numbers and punctuation marks. The problem is that if the text file contains important information and is stolen, the thief can exploit the stolen data into profitable information and if the data is damaged then the data owner suffers a loss. therefore it is necessary to apply security to text files. This research uses the Elgamal method for security of important text files. with security using the elgamal method, important text files have good security. This algorithm is based on the discrete logarithm problem on the group ?P*. The ElGamal algorithm consists of three processes, namely the key formation process, the encryption process and the decryption process. This algorithm is a block cipher, which carries out an encryption process on plaintext blocks and produces ciphertext blocks which are then decrypted, and the results are combined back into a complete and comprehensible message. As a result of the research, it can be concluded that implementing a secret message application can secure Microsoft Word files. The result is that this application is very useful for securing documents so that their contents are not known by unauthorized people. This program produces applications using steps and formulas from the Elgamal algorithm, then changes the text content in the Microsoft Word file as input, then the Elgamal algorithm can be applied and turned into unknown codes (ciphertext). By using Visual Basic 2012 programming and then applying the algorithm or stages of Elgamal, it can result in the application of the Elgamal Method for Securing Microsoft Word Files

Downloads

Download data is not yet available.

References

A. Andikos, “Perancangan Aplikasi Multimedia Interaktif Sebagai Media Pembelajaran Pengenalan Hewan Pada Tk Islam Bakti 113 Koto Salak,” J. Sakinah, vol. 11, pp. 34–39, 2019.

A. Fauzi and Y. Maulita, “Perancangan Aplikasi Keamanan Pesan Menggunakan Algoritma Elgamal Dengan Memanfaatkan Algoritma One Time Pad Sebagai Pembangkit Kunci,” JTIK (Jurnal Tek. Inform. Kaputama), vol. 1, no. 1, pp. 1–9, 2018.

N. Oktaviani and S. Sauda, “Pemodelan dan Implementasi Aplikasi Mobile Umrah Guide Menggunakan Unified Modeling Language,” J. Sains dan Inform., vol. 5, no. 2, pp. 177–18, 2019.

S. M. Hardi, D. Hamonangan, and M. Zarlis, “Implementasi Kriptografi Hibrid Dengan Algoritma Elgamal Dan Algoritma Onetime Pad (Otp) Dalam Pengamanan File Audio Berbasis Desktop,” TECHSI-Jurnal Tek. Inform., vol. 10, no. 2, pp. 129–140, 2018.

T. Zebua, “Pengamanan Data Teks Dengan Kombinasi Cipher Block Chaining dan LSB-1,” 2018.

J. S. B. Tambunan, M. I. Sukmana, and S. N. Siregar, “Penyandian Pesan Berdasarkan Algoritma RC5 dan El-Gamal,” Sink. J. dan Penelit. Tek. Inform., vol. 2, no. 2, pp. 1–5, 2018.

R. P. Sugijanto, H. N. Palit, and L. W. Santoso, “Implementasi Sistem Inventori pada Prodi Informatika Universitas Kristen Petra,” J. Infra, vol. 8, no. 2, pp. 223–227, 2020.

J. Susilo, T. Pujiatna, and S. Firmasari, “Pembinaan Tata Bahasa dan Bentuk Surat-Menyurat Indonesia Berbasis Microsoft di Desa Mandala, Dukupuntang Kabupaten Cirebon,” (Jurnal Pengabdi. Dan Pemberdaya. Masyarakat), vol. 4, no. 1, pp. 173–177, 2020.

Y. Sari, W., Maulita and A. Fauzi, “Analisa Algoritma Elgamal Dalam Penyandian Data Sebagai Keamanan Database,” J. Inform. Kaputama, vol. 2, no. 1, pp. 60–70, 2018.

H. Santoso and M. Fakhriza, “erancangan Aplikasi Keamanan File Audio Format Wav (Waveform) Menggunakan Algoritma Rsa,” Algoritm. J. Ilmu Komput. Dan Inform., vol. 2, no. 1, pp. 47–54, 2018.

T. Rahmasari, “Perancangan Sistem Informasi Akuntansi Persediaan Barang Dagang Pada Toserba Selamat Menggunakan Php Dan Mysql.,” Account. Inf. Syst. Inf. Technol. Bus. Enterp., vol. 4, no. 1, pp. 411–425, 2019.

H. Santoso and M. Fakhriza, “Perancangan Aplikasi Keamanan File Audio Format Wav (Waveform) Menggunakan Algoritma Rsa,” Algoritm. J. Ilmu Komput. Dan Inform., vol. 2, no. 1, pp. 47–54, 2018.

Kusrini, “Konsep dan Aplikasi Sistem Pendukung Keputusan,” 2019.

T. Wijaya, Analisis Data Penelitian Menggunakan SPSS. Yogyakarta: CV Andi Offset, 2009.

H. Ghodang, Path analysis (analisis jalur). Medan: PT Penerbit Mitra Grup, 2020.

V. Jainuri and T. Sukmono, “Optimization of Inventory Costs Using the Continuous Review System (CRS) Method in Controlling the Need for Raw Materials for the Crimean Industry,” Acad. Open, vol. 5, pp. 1–14, 2021, doi: 10.21070/acopen.5.2021.2205.

I. Magdalena, A. Salsabila, D. A. Krianasari, and S. F. Apsarini, “Implementasi Model Pembelajaran Daring Pada Masa Pandemi Covid-19 Di Kelas III SDN Sindangsari III,” PANDAWA, vol. 3, no. 1, pp. 119–128, 2021.

S. Calderwood, K. McAreavey, W. Liu, and J. Hong, “Context-dependent Combination of Sensor Information in Dempster-Shafer Teory for BDI,” Knowl Syst 51, 2016, doi: 10.007/s10115-016-0978-0.

R. E. Putri, “Perancangan Aplikasi Rekam Medis Menggunakan Bahasa Pemograman VB. Net 2010,” J. Tek. dan Inform., vol. 5, no. 1, pp. 49–55, 2018.

S. Sumanto, “Metode AHP Dan SAW Untuk Penerimaan Siswa Baru (Studi kasus:Sekolah Menengah Kejuruan (SMK) Sandikta),” J I M P - J. Inform. Merdeka Pasuruan, vol. 3, no. 3, pp. 50–56, 2018, doi: 10.37438/jimp.v3i3.188.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Penerapan Metode Elgamal Untuk Mengamankan Teks Pada File Dokumen Word

Dimensions Badge

ARTICLE HISTORY


Published: 2023-10-31
Abstract View: 28 times
PDF Download: 14 times

Most read articles by the same author(s)