Enkripsi dan Dekripsi Pesan Menggunakan Polinomial Galois Field dengan Algoritma Hill Cipher

نویسندگان

چکیده

An information is extremely easy to obtain when technology evolving so fast and it important secure the avoid irresponsible parties who want abuse it. Messages that are not safe will harm owner of message, therefore a lot research related message security. This study aims deepen security in encoded form using Galois Field polynomials with one symmetric encryption algorithms, namely Hill Cipher algorithm. Encryption process converting into secret code while decryption reverse process. The this discussion carried out by changing character polynomial form, then operating calculations based on algorithm, results calculation operations again. Based modifications have been made, formulas be multiplied modulo form. In study, keys matrix elements members result random 256 characters binary bit-8. From research, we gain insight encoding can done which used later other forms encoding.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multidimensi Pada Data Warehouse Dengan Menggunakan Rumus Kombinasi

Multidimensional in data warehouse is a compulsion and become the most important for information delivery, without multidimensional data warehouse is incomplete. Multidimensional give the able to analyze business measurement in many different ways. Multidimensional is also synonymous with online analytical processing (OLAP).

متن کامل

Validasi data dengan menggunakan objek lookup pada borland delphi 7.0

s: Developing an application with some tables must concern the validation of input (scpecially in Table Child). In order to maximize the accuracy and input data validation. Its called lookup (took data from other dataset). There are 2 (two) ways to lookup data from Table Parent: 1) Using Objects (DBLookupComboBox & DBLookupListBox), or 2) Arranging The Properties Of Fields Data Type (shown by u...

متن کامل

Aplikasi belajar membaca iqro' berbasis mobile

Abstrak Kemajuan Ilmu Pengetahuan dan Teknologi (IPTEK) hendaklah diikuti dengan Iman dan Takwa (IMTAK), sangat disayangkan, jika masih banyak masyarakat yang belum bisa membaca huruf hijaiyah yang merupakan dasar dari Al-Qur’an. Masyarakat sekarang telah disibukkan dengan berbagai aktipitas sehingga mereka sulit untuk belajar dengan Ustad atau Ustadza mengenai huruf hijaiyah. Untuk mengatasi m...

متن کامل

Direct Power Control of a Dfig-based Wind Turbine under Unbalanced Grid Voltage without Rotor Position Sensor

In this paper, the behavior of a doubly fed induction generator (DFIG) is proposed under an unbalanced grid voltage and without using a rotor position sensor. There are two main methods that have been used for the detection of rotor position: use of a shaft sensor and use of a sensorless algorithm. In this paper the shaft sensor is eliminated and a position sensorless algorithm is used for esti...

متن کامل

Analisis Kinerja Sistem Cluster Terhadapa Aplikasi Simulasi Dinamika Molekular NAMD Memanfaatkan Pustaka CHARM++

Tingkat kompleksitas dari program simulasi dinamika molekular membutuhkan mesin pemroses dengan kemampuan yang sangat besar. Mesin-mesin paralel terbukti memiliki potensi untuk menjawab tantangan komputasi ini. Untuk memanfaatkan potensi ini secara maksimal, diperlukan suatu program paralel dengan tingkat efisiensi, efektifitas, skalabilitas, dan ekstensibilitas yang maksimal pula. Program NAMD...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Jurnal Riset Mahasiswa Matematika

سال: 2022

ISSN: ['2808-4926', '2808-1552']

DOI: https://doi.org/10.18860/jrmm.v2i2.15150