Implementasi Kriptografi Untuk Keamanan Pesan Chatting Menggunakan Algoritma Pontifex
DOI:
https://doi.org/10.30865/resolusi.v1i2.69Keywords:
Cryptography; Message; Chat; Pontifex AlgorithmAbstract
Data is a collection of important elements that are useful, such as images, sounds, text. Data is a component that is vulnerable to theft or wiretapping, especially if the data contains important and confidential matters. Many people who have an interest want to get data illegally without going through official procedures. Pin, Password, Account Number, or Credit Card Number are small pieces of data that are often misused by irresponsible individuals. This of course needs to be prevented so that incidents of data theft do not occur repeatedly. To facilitate the process of securing text so that it is not easily read by others so that the authenticity of the data is maintained. To protect information from those who are not entitled to access, an algorithm is used, namely the Pontifex algorithm in maintaining the confidentiality of the text message. Many data security techniques have been developed at this time, this certainly makes it easier for all parties to secure data. One that is widely used today is a computerized security system that can be used anytime and anywhere. This research uses Visual Basic 2008 tools in the process of safeguarding information from other parties who are not entitled to access it.
Downloads
References
M.A.Amri, dkk, 2009, “Pontifex Implementation In Quantum Cellular Automata”, Journal IEEE Trans. On Computer, Vol. 58, No. 6, pp.721-727.
Ariyus, Dony, 2005, “Kriptografi Keamanan Data Dan Komunikasi”. Edisi Pertama. Yogyakarta. Graha Ilmu.
Sadikin, Rifki, 2012, ”Kriptografi Untuk Keamanan Jaringan”, Penerbit Andi, Yogyakarta.
Ariyus, Dony, 2008, ”Computer Security, Andi, Yogyakarta.
https://www.maxmanroe.com/vid/teknologi/pengertian-chatting.html,diakses tanggal 24 April 2018.
https://nisaahaniblog.wordpress.com/2016/07/15/teori-ascii-american-standard-code-for-information-interchange/, diakses tanggal 26 Juni 2018
A.S. Rosa dan Shalahuddin. M, 2013, “Rekayasa Perangkat Lunak Terstruktur”, Andi, Yogyakarta.
Aditya, Arif Primananda, 2013, “Dasar-Dasar Pemrograman Database Dekstop Dengan Visual Basic. Net 2008, PT. Elex Media Komputindo, Jakarta.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Kriptografi Untuk Keamanan Pesan Chatting Menggunakan Algoritma Pontifex
ARTICLE HISTORY
Issue
Section
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).