2020
DOI: 10.30700/jst.v10i1.521
|View full text |Cite
|
Sign up to set email alerts
|

Implementasi Hill Cipher Pada Kode Telepon dan Five Modulus Method dalam Mengamankan Pesan

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
3
0
1
Order By: Relevance
“…Algoritma enkripsi dari pakar ahli kriptografi terdahulu seperti algoritma IDEA, RSA, DES, 3DES, blowfish, MD4, MD5, SHA-1, McEliecce, Hill Cipher dan masih banyak lagi algoritma lainnya. namun tidak semua algoritma tersebut mampu untuk bertahan pada serangan penyadapan data dan informasi [7]. Pada Penelitian ini menggunakan metode Vigener Cipher dalam melakukan enkripsi dengan memanfaatkan kunci rahasia dari user atau dokter lebih meningkatan sistem keaaman data [8].…”
Section: Pendahuluanunclassified
“…Algoritma enkripsi dari pakar ahli kriptografi terdahulu seperti algoritma IDEA, RSA, DES, 3DES, blowfish, MD4, MD5, SHA-1, McEliecce, Hill Cipher dan masih banyak lagi algoritma lainnya. namun tidak semua algoritma tersebut mampu untuk bertahan pada serangan penyadapan data dan informasi [7]. Pada Penelitian ini menggunakan metode Vigener Cipher dalam melakukan enkripsi dengan memanfaatkan kunci rahasia dari user atau dokter lebih meningkatan sistem keaaman data [8].…”
Section: Pendahuluanunclassified
“…Cryptography is a branch of science that studies how to secure and protect the information (data) that is sent. The two main concepts of cryptography are encryption and decryption (Hasan et al, 2020). The aim is to maintain the confidentiality of messages sent so that they are not known by unauthorized and irresponsible people.…”
Section: Introductionmentioning
confidence: 99%
“…The Hill Cipher method is one of several methods in cryptography. This matrix is an (Hasan et al, 2020). Hill Cipher does not replace each of the same letters in the plaintext with other letters that are the same in the ciphertext because it uses matrix multiplication as a basis for encryption and decryption (Endaryono et al, 2021) (Permata Dewi et al, 2022.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, a study [12] examines using Hill Cipher for the encryption and decryption process using rectangular matrix keys. The research [13] discusses text data security by applying Hill Cipher to Telephone Codes and the Five Modulus Method. The topic of Hill Cipher algorithm hybrid cryptography as the development of symmetric key cryptography [14] discusses how to secure student academic grades using the Hill Cipher hybrid algorithm.…”
Section: Introductionmentioning
confidence: 99%