TY - THES N1 - Muhamad Zaki Riyanto, S.Si., M.Sc. ID - digilib69264 UR - https://digilib.uin-suka.ac.id/id/eprint/69264/ A1 - Miftah Aulia Mustamin, NIM.: 20106010010 Y1 - 2024/12/13/ N2 - With the increasing use of information technology, the need for data security has become more urgent. The internet is a medium through which data is vulnerable to security issues. One significant factor contributing to these vulnerabilities is insufficient security configurations, which open the door to potential hacking attempts. In 1994, PeterWilliston Shor introduced a quantum algorithm that has since become foundational for the development of quantum computing. Shor posited that quantum computers could potentially compromise internet data security currently protected by traditional cryptographic systems. One cryptographic system considered to be secure against quantum computer attacks due to its random encryption process is the McEliece Cryptosystem. This system is based on linear codes, with cyclic codes being a well-known example developed in 1960 by Irving S. Reed and Gustave Solomon. This thesis research discusses the application of cyclic codes in the McEliece public-key cryptographic system for key generation, encryption, and decryption processes. The study also includes the application of cyclic codes in the McEliece public-key cryptographic system for message text, with calculations performed using Maple software. PB - UIN SUNAN KALIJAGA YOGYAKARTA KW - Kode Siklik KW - Kriptografi KW - Kriptografi McEliece KW - Kunci Publik KW - Teori Pengkodean M1 - skripsi TI - PENERAPAN KODE SIKLIK PADA SISTEM KRIPTOGRAFI KUNCI PUBLIK MCELIECE AV - restricted EP - 148 ER -