PENGAMANAN DATA DALAM JARINGAN LAN DENGAN MENGGUNAKAN ALGORITMA CHIPER TRANSPOSISI

Authors

  • Sanco Simanullang Universitas Methodist Indonesia

DOI:

https://doi.org/10.46880/mtk.v5i2.421

Keywords:

data security, LAN, columnar transposition, cipher transposition

Abstract

Data security is important in the implementation of information technology, especially in the field of computers, which allows thousands of people and computers around the world to be connected in a virtual world known as cyberspace or the internet. This can create new challenges and demands for the availability of a data security system that is as sophisticated as the advances in computer technology itself. In cryptography, data sent over the network will be disguised in such a way that even if the data can be read by third parties, it should not be understood by unauthorized parties. Data to be sent and has not been encrypted which produces ChipperTtext. The implementation of the transposition algorithm for securing data flowing in the Local Area Network (LAN), the transposition process changes the arrangement of letters from the source text (plaintext), with a column transposition cipher, to obtain the words in a barred manner. In the transposition cipher, the plaintext is the same, but the sequence is changed. . This algorithm transposes a series of characters in the text. Another name for this method is permutation because transpose each character in the text is the same as permutating the characters so that this application generates encrypted data on the network stream and returns it to plaintext at the final destination. So that it can be ensured that the information and data sent to other parties are safe from unauthorized parties.

References

D. R. Manalu, “Implementasi Steganografi Pada Citra Digital Untuk Keamanan Pengarsipan Data Kampus,” Academia.Edu, vol. 19, no. 1, pp. 1–5, 2015.

. R. Sadikin, Kriptografi untuk keamanan jaringan dan implementasinya dalam bahasa Java, Yogyakarta: Andi, 2012.

. M. Tamba, Implementasi Algoritma Transposisi Cipher Dalam Sistem Pengamanan Data Pada Jaringan LAN, Jurnal Times, Volume VII No 1, Juni 2018

. B.S. Hasugian, Peranan Kriptografi Sebagai Keamanan Sistem Informasi Pada Usaha Kecil Dan Menengah, Jurnal Warta,Juli 2017

. Adrisatria, Yogie.2006. Study Pencarian Kolisi Pada Sha-1 oleh xiaoyun Wang dkk.

. http://www.informatika.org/~rinaldi/kriptografi/2006-2007/makalah2/makalah-079.pdf.

. Apriliawan,Egie. 2009. Fungsi Hash Pada Kriptografi.

. http://docs.docstoc.com/orig/2220518/bf558cb1-27de-428f-baa97d1de153fab3.pdf.

. Ariesanda, Boyke, 2008, Rancangan Dan Analisis Chipher Berbasis Algoritma transposisi Dengan periodisasi kunci.

. http://www.informatika.org/~rinaldi/kriptografi/2006-2007/Makalah1/Makalah1-043.pdf. Diakses tanggal : 25 Maret 2018.

. Ariyus, Dony. 2008. Pengantar Ilmu Kriptografi Teori, Analisi, dan Implementasi. Yogyakarta :Penerbit Andi

. Melwin Syafrizal, Pengantar Jaringan Komputer, Andi Offset Yogykarta, 2005.

. D. S. Nasution, “Penerapan Metode Linear Kongruen dan Algoritma Vigenere Cipher Pada Aplikasi Sistem Ujian Berbasis LAN,” Jurnal Pelita Informatika Budi Darma, vol. IV, no. 1, pp. 1-10, 2013.

.A. Boyke, “Rancangan Dan Analisis Cipher Berbasis Algoritma Transposisi Dengan Periodisasi Kunci,” Institut Teknologi Bandung, Bandung, 2010.

Downloads

Published

13-08-2021

How to Cite

[1]
S. Simanullang, “PENGAMANAN DATA DALAM JARINGAN LAN DENGAN MENGGUNAKAN ALGORITMA CHIPER TRANSPOSISI”, METHODIKA, vol. 5, no. 2, pp. 12–16, Aug. 2021.