Perancangan Aplikasi Kriptografi Menggunakan Algoritma RC4 (Rivest Code 4) Untuk Mengamankan Pesan Email di PT CREATIFACTORY
Keywords:
file, Cryptography, Algorithms Rivest Code 4 (RC4), Encryption, DecryptionAbstract
The development of information technology that is so advanced rapidly has made information a basic need for everyone who has it. To be able to secure the information we have, one of the techniques for securing data and information is to use cryptography. Therefore, the author makes an application that can maintain the confidentiality of information from data theft crimes, and the application in question is a web-based email cryptography application. This application can be used to secure the data contained in the user's email. In this application the cryptographic algorithm that will be used is the Rivest Code 4 (RC4) algorithm. RC4 is a stream cipher type algorithm that processes input data units. The Rivest Code 4 (RC4) algorithm is also part of a symmetric algorithm, where the encryption and decryption processes have the same key. Making this application using the PHP programming language. The modeling method in making this application is the UML (Unified Modeling Language) method. The result of this research is an email security cryptography application that is able to encrypt and decrypt documents in formats such as *ai, *ps, *indd, *docs, *xls, *pdf, *ppt, *svg etc, using the Rivest Code 4 (RC 4) algorithm web based.
References
Agung, L. (2012). Aplikasi Pemrograman Javascript untuk Halaman Web. Yogyakarta: Andi Offset.
Ariyanto, Y. (2009). Algoritma RC4 Dalam Proteksi Transmisi Dan Hasil Query Untuk ORDBMS POSTGRESQL. 10, 53–59.
Ariyus. (2008). PENERAPAN KRIPTOGRAFI CAESAR CIPHER PADA FITUR CHATTING SISTEM. JIKO (Jurnal Informatika dan Komputer).
Budiarto. (2012).“Pengertian Notepad++”.<http://info-programkomputer.blogsport.com/2012/04/notepad.html>. [diakses tanggal 29 April 2014].
Fadli, A. R. (2013). Aplikasi Kriptografi dan Steganografi Menggunakan Algoritma Caesar Chiper dan Least Significant Bit.
Firdaus. (2007). “7 Jam Belajar Interaktif PHP & MySql Dengan Dreamweaver”. Palembang: Maxikom.
Jayusman, Y. (2004). Pengantar Kriptografi. p.16.
Kadir. (2008). Pengertian Web Para Ahli.
Muhammad Nurtanzis Sutoyo, Murhaban. (2016). Kombinasi Algoritma Kriptografi Caesar Chiper dan Vigenere Chiper Untuk Keamanan Data. FTI Universitas Sembilanbelas November Kolaka: Jurnal Mekanova, 2016.
Munawar. (2005). Pemodelan Visual dengan UML. Yogyakarta: Graha Ilmu.
Munir, R. (2004). Sistem Kriptografi Kunci-Publik. Departemen Teknik Informatika Institut Teknologi Bandung.
Nathasia, N.D. dan Wicaksono, a. E. (2011). Penerapan Teknik Kriptografi Stream-Cipher Untuk Pengaman Basis Data. ICT Research Center UNAS: 6(1), pp.1–22.
Nugroho, A. (2009). Rekayasa Perangkat Lunak Menggunakan UML & Java. Yogyakarta: Andi Offset.
Passha, F. (2013). Studi dan Analisis Implementasi Algoritma RC4 Dengan Modifikasi Kunci Menggunakan Fungsi SHA-1 Sekolah Teknik Elektro dan Teknik Informatika Institut Teknologi Bandung.
Puspitasari. (2011). Pemrograman Web Database dengan PHP & MySQL. Jakarta: Skripta.
Quadri, S., & Farooq, S. U. (2011). Software Testing-Goals,Principles, and Limitations. International Journal of Computer Application Volume 6. No.9, 7-10.
Safaat, N. (2012). Android: Pemrograman Aplikasi Mobile Smartphone Dan Tablet PC Berbasis Android Edisi Revisi. Bandung: Informatika.
Salahuddin, M., & Rossa. (2010). Pemograman J2ME Belajar Cepat Pemograman Perangkat Telekomunikasi Mobile. Bandung: Informatika.
Satzigner, Jackson, & Burd. (2010). System Analysis and Design with the Unified Process. USA: Course Technology, Cengage Lerning.
Solihin, A. (2016, 10). Achmad Solichin, 2016. “Pemrograman Web dengan PHP dan MySQL”, Penerbit Budi Luhur.
Yuningrat Dwi Putri, Rosihan, & Salkin Lutfi. (2019). Penarapan Kriptografi Caesar Chipper pada Fitur Chatting Sistem Informasi Freelance. Universitas Khairun Jl. Jati Metro, Kota Ternate Selatan, JIKO (Jurnal Informatika dan Komputer) Vol. 2, No. 2, Oktober 2019. hlm. 87 - 94.