2021
DOI: 10.36080/bit.v18i1.1446
|View full text |Cite
|
Sign up to set email alerts
|

Penerapan Algoritma Kriptografi Twofish Untuk Mengamankan Data File

Abstract: The development of technology in the field of telecommunications makes people more and more often send data files in the form of doc, pdf, xls, voice, image, video via the internet. because the internet is a public medium that is vulnerable to intrusion and theft of information on data or files by unauthorized parties. The problem is that there are frequent changes or manipulation of the contents of data files from bank notes processing, cash pickups, document pick-ups, clearing items, atm & cdm service, atm … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…This algorithm is a 128-bit block algorithm and can receive keys with variable lengths of 128 bits to 256 bits. The key used at the time of encryption is the same as that used when decrypting with a length of 128 bits [14]. This Twofish algorithm uses a 16-round feistel network structure and also uses additional whitening on input (input) and output (output) [15].…”
Section: Introductionmentioning
confidence: 99%
“…This algorithm is a 128-bit block algorithm and can receive keys with variable lengths of 128 bits to 256 bits. The key used at the time of encryption is the same as that used when decrypting with a length of 128 bits [14]. This Twofish algorithm uses a 16-round feistel network structure and also uses additional whitening on input (input) and output (output) [15].…”
Section: Introductionmentioning
confidence: 99%