2021
DOI: 10.33633/jais.v6i2.4502
|View full text |Cite
|
Sign up to set email alerts
|

A File Encoding Using A Combination of Advanced Encryption Standard, Cipher Block Chaining and Stream Cipher In Telkom Region 4 Semarang

Abstract: The increase in significant advances in information technology greatly provides comfort and convenience in managing data. This convenience is what makes people who are not responsible for using it as a crime such as hacking, cracking, phishing, and so on. In Telkom Region 4 Semarang, there is a container where there are important company data such as customer data. Customer data is very important and the contents of the data must be kept confidential. The company has experienced significant losses due to infor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
0
0
Order By: Relevance
“…As for column transposition, it is a type of algorithm that transposes letters to encrypt or decrypt. Other examples of transposition techniques in cryptography are Rail Fence transposition, Route Transposition, Multiple Transposition, and Myszkowski Transposition [14], [20]. The transposition technique works by creating coded messages (ciphertext) by replacing the positions of the original message objects (plaintext) without replacing or changing the original message (plaintext).…”
Section: Figrue 1 Google Trends Over Cryptography and Data Securitymentioning
confidence: 99%
“…As for column transposition, it is a type of algorithm that transposes letters to encrypt or decrypt. Other examples of transposition techniques in cryptography are Rail Fence transposition, Route Transposition, Multiple Transposition, and Myszkowski Transposition [14], [20]. The transposition technique works by creating coded messages (ciphertext) by replacing the positions of the original message objects (plaintext) without replacing or changing the original message (plaintext).…”
Section: Figrue 1 Google Trends Over Cryptography and Data Securitymentioning
confidence: 99%