Pengembangan Prototype Sistem Kriptografi Untuk Enkripsi Dan Dekripsi Data Office Menggunakan Metode Blowfish Dengan Bahasa Pemrograman Java

Mohamad Natsir

Abstract


The development of computer technology that makes computers much more rapidly found from government agencies, housing, schools, internet cafes, household, personal or even called to make a laptop computer as a requirement for all circles. The works were formerly manual now vastly computerized ranging from homework from school to international companies and all the jobs it is an important information. Like the important information, the security system is a crucial part of a computer application and one way to protect our data from the parties is irresponsible to perform cryptographic would like to use that compiler uses blowfish algorithm. Blowfish or OpenPGP.Cipher.4 is included in the class encryption Symmetric Cryptosystem, the encryption method is similar to the Data Encryption Standard (DES - like - Cipher). Created for use on computers that have a large microprossesor (32 - bit or more with large data caches). Blowfish was developed to meet the design criteria allows the implementation where the optimal state can reach 26 clock cycles perbyte compact, which can run on less than 5 KB of memory, the simple algorithm so easy to determine guilt, and the security which the variable key length varies (minimum 32 bits, 448 bits maximum, Multiple 8 bits, 128 bits default).

Keywords


cryptography, symmetric key, blowfish algorithm, encryption, decryption

Full Text:

PDF

References


Andriyansyah. Perangkat Lunak Keamanan Data menggunakan metode Blowfish dan metode RC4, Jakarta,2005.

Ariyus, Dony. Computer Security, Yogyakarta: 2006.

Ariyus, Dony. Pengantar Ilmu Kriptografi: Teori, Analisis, dan Implementasi. Andi, Yogyakarta, 2008.

Asep, Herman, Suyanto. Pemograman Java: Konsep Pemrograman Berorientasi Objek< http://www.bambutechno.com> (Diakses 22 Januari 2014).

Abdul Aziz. Implementasi Setganografi Teknik LSB (Least Significant Bit) dengan Algoritma Kriptografi Blowfish dan Fungsi Hash SHA-1: 2013.

Burnett, Steve and Raine, Stephen. RSA Security’s Official Guide to Cryptography. Mc Graw Hill Osborn, California: 2004.

Christian, W. Dawson, Projects in Computing and Information Systems. < www.pearsoned.co.uk> England.First published: 2005 (Diakses 13 Maret 2013).

Firmansyah. Kriptografi Sederhana http://politekniktelkom.ac.id/30110176/program-kriptografi-sederhana. [Diakses 12 Oktober 2013].

Hariyanto, Bambang. Esensi-Esensi Bahasa Pemrograman Java. Informatika, Bandung: 2003.

Hendra, kurniawan, Eri, Mardiani, Nur, Rahmansyah. Program Java Netbeans, XAMPP dan iReport. Elex Media Media Komputindo, Jakarta:2011.

Irham. Delapan Aspek Keamanan Informasi. jurnal Nasional 2013-aspek-keamanan informasi.html. [Diakses 10 Oktober 2013].

Kadir, Abdul. Dasar Pemrograman JavaTM 2. Andi, Yogyakarta: 2005.

Mary, Shaw. What Makes Good Research in Software Engineering School of Computer Science, Carnegie Mellon University, Pittsburgh PA 15213 USA (Diakses 15 Maret 2013).[14] Miftakhul, Huda Bunafit. Membuat Aplikasi mini/Supermarket dengan JAVA. Elex Media Komputindo:2011.

Moedjiono. Pedoman Penelitian, Penyusunan dan Penilaian Tesis (V.5). Universitas Budi Luhur, Jakarta 2012 http://pascasarjana.budiluhur.ac.id/wpcontent/upload/2012/10/Pedoman-Tesis-PPS-UBL-V5-010112.pdf [Diakses 10 Oktober 2013].

Moedjiono. Metodologi Penelitian dan Pedoman penyusunan Laporan Tugas Akhir Tesis & Paper. Universitas Budi Luhur, Jakarta,2013.

Munir, Rinaldi. Pengantar Kriptografi. Bandung, Indonesia,2006.

Prabowo, Setyo Budi. Definisi Keamanan Informasi. Informatika:2013

Pressman, S.R. Software Engineering a Practitioner’s Approach, USA Mc Grawhill. Inc:1997.

Publikasi. Implementasi Algoritma Blowfish untuk aplikasi enkripsi dan Dekripsi File http://repository.amikom.ac.id/files/Publikasi_06.11.1189/.[Diakses 10 Oktober 2013].[21] Saputra, Nugrah Dwi. Keamanan Informasi. SemnasIF 2010 [Diakses 10 Oktober 2013].

Schneier.Bruce. Description of a new Variable-Length Key, 64-Bit Block Cipher (Blowfish), SpringerVerlag:1994.

Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Son, New York:1996.

SeminasIf. Seminar Nasional Informatika http://repository.upnyk.ac.id/Aplikasi_Kriptografi_File_Menggunakan Algoritma_Blowfish/. [Diakses 10 Oktober 2013].

Seth, Shasi M. and Mishra, Rajan., “Comparative Analysis of Encryption Algorithms for Data Communication”, International Journal of Computer Science and Technology (IJCST), vol. 2, (Juni, 2011): 292-294.

Stalling. Cryptography and Network Security Principles and Practices, Fourth Edition, 2005.

Sumarkidjo dkk. Jelajah Kriptografi, Lembaga Sandi Negara, Jakarta, 2007.

Tosin, Rijanto. Flowchart untuk Siswa dan Mahasiswa. Dinastindo. Jakarta, Indonesia, 1994.

Tri, Andriyanto, Pardede. Studi Perbandingan IDEA dan Algoritma Blowfish. Seminar Nasional FTi Universitas Gunadarma Jakarta :2008.

Wahana. Memahami Model Enkripsi dan Security Data, Andi Offset, Yogyakarta:2003.

Whitten, L.J, Bentley, D.L & Dittman, C.K. System Analysis and Design Methods, USA Mc Grawhill, Inc:2004.

Encryption Algorithm for JavaBased Devices”, International Seminar on Scientific Issues and Trends:2011.


Refbacks

  • There are currently no refbacks.