TY - THES N1 - M. Zaki Riyanto, M.Sc ID - digilib46945 UR - https://digilib.uin-suka.ac.id/id/eprint/46945/ A1 - PURNAMA SARI 17106010045, NIM. 17106010045 Y1 - 2021/07/08/ N2 - Internet is a communication channel that is prone to security attacks, one of security attacks is attack on secrecy. Observing the development of quantum computers, Peter Shor in 1997 assumed that the cryptosystem in use today is insecure against quantum computer crime. McEliece cryptosystem is considered safe against the threat of quantum computers because randomization in the encryption process. This system is built based on linear code, one of the well-known linear codes is the Reed-Muller code. This code has an efficient decoding algorithm and has more correction capability than the minimum distance of the Reed-Muller code. The study discusses the McEliece cryptosystem using first order Reed-Muller code. The security of the McEliece cryptosystem is determined by a linear code decoding algorithm. McEliece cryptosystem uses the first order Reed-Muller code resulting in a secure and fast system. The McEliece cryptosystem using the Reed-Muller code first order is also equipped with an application to the message text. PB - UIN SUNAN KALIJAGA YOGYAKARTA KW - Coding Theory KW - Cryptography KW - Linear Code KW - Public Key KW - Reed-Muller Code M1 - skripsi TI - SISTEM KRIPTOGRAFI MCELIECE BERDASARKAN KODE REED-MULLER ORDER PERTAMA AV - restricted EP - 150 ER -