Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES)

نویسندگان

چکیده

Ringkasan Seiring berjalannya waktu, kemajuan teknologi komputer dan telekomunikasi telah menjadi kebutuhan yang sangat berguna untuk melakukan banyak tugas dengan cepat, tepat, akurat. Namun, diyakini bahwa aspek keamanan data penting informasi sensitif, karena juga memiliki efek negatif dari orang tidak berwenang menyadap penting. Enkripsi adalah salah satu solusi atau metode terbaik menjaga kerahasiaan keandalan Anda, serta dapat meningkatkan Anda. Kriptografi bidang ilmiah mempelajari enkripsi data. dibagi dua jenis, klasik modern, kunci simetris asimetris. Kunci Advanced Encryption Standard (AES) kadang disebut sebagai Rijndael. AES algoritma aman melindungi sensitif menggunakan berbagai teknik dekripsi panjang seperti 128-bit, 192 bit, 256 bit. Pada tahun 2001, proses mengunakan 4 transformasi dasar urutan trasformasisubbytes, shiftrows, mixcolumns, danaddroundkey. Sedangkan pada invers semua kecuali addroundkey invshiftrows, invsubbytes, addroundkey,dan invmixcolumns. diawali menentukan plaintext key nya. Selanjutnya dilakukan beberapa trnsformasi subbytes, Akan tetapi ketika trasformasi diproses setiap berupa biner heksadesimal. ruang digunakan sehingga terhindar pencurian

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Encryption Standard (AES) in Counter Mode

The Advanced Encryption Standard (AES), also known as Rijndael is a block cipher. The National Institute of Standards and Technology (NIST) has defined five modes of operation for AES. Each of these modes has different characteristics. The five modes are: Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and Counter (CTR). Only AES Counter mo...

متن کامل

Chapter 7 The Advanced Encryption Standard ( AES )

All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. The DES algorithm was broken in 1998 using a system that cost about $250,000. It was also far too slow in software as it was developed for mid-1970’s hardware and does not produce efficient software code. Triple DES on the other hand, has thr...

متن کامل

Evaluating the performance of Symmetric Key Algorithms: AES (Advanced Encryption Standard) and DES (Data Encryption Standard)

Encryption algorithms are known to be computational intensive. Internet and networks applications growing very fast, so the needs to protect. Encryption plays the very important role in information security system. On the other side, the symmetric key algorithms consume a significant amount of computed resources such as speed, time, memory and cost. The symmetrical algorithms AES and DES as a s...

متن کامل

Sistem Informasi Pengarsipan Menggunakan Algoritma Levensthein String pada Kecamatan Seberang Ulu II

Archival information systems in government agency is one of the most used applications for daily acitivities. One feature in application management information document is searching. This feature serves to search for documents from a collection of available information based on keywords entered by the user. But some researches on a search engine (searching) concluded that the average user error...

متن کامل

Multidimensi Pada Data Warehouse Dengan Menggunakan Rumus Kombinasi

Multidimensional in data warehouse is a compulsion and become the most important for information delivery, without multidimensional data warehouse is incomplete. Multidimensional give the able to analyze business measurement in many different ways. Multidimensional is also synonymous with online analytical processing (OLAP).

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Jurnal Pendidikan Sains dan Komputer

سال: 2022

ISSN: ['2809-476X']

DOI: https://doi.org/10.47709/jpsk.v2i01.1390