IMPLEMENTASI ALGORITMA HILL CIPHER DENGAN MODIFIKASI PROSES MENGGUNAKAN ALGORITMA CAESAR CIPHER PADA FILE DOKUMEN PLAINTEXT

MUHAMMAD AZZAM MUJADDID, NIM. 13650023 (2017) IMPLEMENTASI ALGORITMA HILL CIPHER DENGAN MODIFIKASI PROSES MENGGUNAKAN ALGORITMA CAESAR CIPHER PADA FILE DOKUMEN PLAINTEXT. Skripsi thesis, UIN SUNAN KALIJAGA YOGYAKARTA.

[img]
Preview
Text (IMPLEMENTASI ALGORITMA HILL CIPHER DENGAN MODIFIKASI PROSES MENGGUNAKAN ALGORITMA CAESAR CIPHER PADA FILE DOKUMEN PLAINTEXT)
13650023_BAB-I_IV-atau-V_DAFTAR-PUSTAKA.pdf

Download (2MB) | Preview
[img] Text (IMPLEMENTASI ALGORITMA HILL CIPHER DENGAN MODIFIKASI PROSES MENGGUNAKAN ALGORITMA CAESAR CIPHER PADA FILE DOKUMEN PLAINTEXT)
13650023_BAB-II_sampai_SEBELUM-BAB-TERAKHIR.pdf
Restricted to Registered users only

Download (4MB)

Abstract

The importance of maintaining the security of plaintext documents through the encryption process in cryptography, various algorithms offer a variety of processes for encryption and description. The hill cipher algorithm is unique among other classical cryptographic algorithms because it uses matrix multiplication in the process. But this is a weakness because the key used is in the form of matrix so it is very easy to guess if the process of encryption or decryption is done with the key matrix is definitely using the hill cipher algorithm. The research that will be done is to implement cryptographic algorithm with process modification. Algorithm that will be used is hill cipher with modification process of caesar cipher substitution. The working of the hill cipher algorithm is to use the matrix multiplication of keys. The key matrix to be used has a 2x2 order and process modification lies in a combination of initial character determination using a substitution of 3 caesar ciphers. In research conducted to give results that algortima modification can be implemented and provide alteranatif in cryptography process. Test results obtained is the more the number of characters processed the time required will be longer. The magnitude of the determinant also affects time and size during the poses. A 1 character increment occurs if the initial character of the encryption process is an odd number. Encryption process can run and descriptions can be done in accordance with the rules specified.

Item Type: Thesis (Skripsi)
Additional Information: Sumarsono S.T, M.Kom
Uncontrolled Keywords: Crypthography , Hill Cipher , Caesar Cipher , Plaintext
Subjects: Tehnik Informatika
Divisions: Fakultas Sains dan Teknologi > Teknik Informatika (S1)
Depositing User: Miftahul Ulum [IT Staff]
Date Deposited: 21 Jul 2017 08:23
Last Modified: 21 Jul 2017 08:23
URI: http://digilib.uin-suka.ac.id/id/eprint/26721

Share this knowledge with your friends :

Actions (login required)

View Item View Item
Chat Kak Imum