Enkripsi data digital berupa file text menggunakan metode gost (Gosudarstvennyi standard) dan aplikasinya menggunakan bahasa pemrograman delphi

Maryadi, Gun (2003) Enkripsi data digital berupa file text menggunakan metode gost (Gosudarstvennyi standard) dan aplikasinya menggunakan bahasa pemrograman delphi. Undergraduate thesis, FMIPA UNDIP.

[img]PDF
Restricted to Repository staff only

3654Kb
[img]
Preview
PDF
25Kb
[img]
Preview
PDF
239Kb
[img]
Preview
PDF
447Kb
[img]
Preview
PDF
306Kb
[img]
Preview
PDF
650Kb
[img]PDF
Restricted to Repository staff only

1127Kb
[img]
Preview
PDF
211Kb
[img]
Preview
PDF
214Kb
[img]
Preview
PDF
1550Kb

Abstract

Untuk mengamankan data/informasi dan pihak pengganggu diperlukan metode pengamanan data dan salah satunya dengan metode enkripsi. Tugas akhir ini membahas pengarnanan data digital berupa file teks yaitu dengan menggunakan metode enkripsi GOST (Gosudarstvennyi Standard). Proses enkripsinya menggunakan operasi logika xor, yang dikombinasikan dengan proses substitusi, dan transposisi menurut fungsi Lr-j xor AR,i,Kr) dimana Mr-hKr) (T(S(Rr_i xor KO)). Sandi diperoleh dari pesan plainteks yang dibagi dua menjadi Lo dan Ro selanjutnya diproses sesuai algoritma enkripsi GOST dengan kontrol pemasukan kunci. Proses enkripsi ini menghasilkan data yang terenkripsi yang diharapkan aman dan pengganggu. Dan sebaliknya pesan plainteks diperoleh dengan mendekripsi sandi menggunakan algoritma dan kunci yang sama. The efforts to keep the data being leaked to the adversary, it is need such methods that can keep it secure, and one of them is the encryption's method. This final project explain about digital data security precisely on the text file with GOST (Gosudarstvennyi Standard) method. The encryption's process is using logical operation xor, combinated with substitution, and transposition process agree with function Lr_1 xor Mr-i,Kr) that AR,/,Kr) (TART.] xor KO)). The ciphertext is result from plantext divided by two L© and Ro then process agree with GOST encryption algorithm by control the entering key. This encryption process result the encrypted data that is hoped secure from adversary.And the otherwise, plantext order is resulted by decrypte ciphertext using the same algorithm and key. This document is Undip Institutional Repository Collection. The author(s) or copyright owner(s) agree that UNDIP-IR may, without changing the content, translate the submission to any medium or format for the purpose of preservation. The author(s) or copyright owner(s) also agree that UNDIP-IR may keep more than one copy of this submission for purpose of security, back-up and preservation: http://eprints.undip.ac.id ) vu This document is Undip Institutional Repository Collection. The author(s) or copyright. owners) agree that UNDIP-IR may, changing the content, translate the' submission to any medium or format for the purpose of preservation. The author(s) or copyright im I m—, th:n one copy of this submission for purpose of security, back-up and preservation: ( http://eprints.und io.ac.id vi

Item Type:Thesis (Undergraduate)
Subjects:Q Science > QA Mathematics
Divisions:Faculty of Science and Mathematics > Department of Mathematics
ID Code:31623
Deposited By:Mr UPT Perpus 1
Deposited On:23 Nov 2011 14:56
Last Modified:12 Jan 2012 08:56

Repository Staff Only: item control page