Pengamanan E-Dokumen Berbasis Steganografi Dengan Kombinasi Advanced Encryption Standard (AES) 128 Bit
Abstract
Keywords
Full Text:
PDFReferences
Sumarno, “Analisis Kinerja Kombinasi Algoritma Message-Digest Algorithm 5 (MD5), Rivest Shamir Adleman (RSA) dan Rivest Cipher 4 (RC4) pada Keamanan E-Dokumen,” JUSIKOM PRIMA (Jurnal Sist. Inf. Ilmu Komput. Prima), vol. 2, no. 1, pp. 41–48, 2018.
S. P. Gochhayat et al., “Reliable and secure data transfer in IoT networks,” Wirel. Networks, vol. 26, no. 8, pp. 5689–5702, 2020, doi: 10.1007/s11276-019-02036-0.
M. K. Harahap, “Analisis Perbandingan Algoritma Kriptografi Klasik Vigenere Cipher Dan One Time Pad,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 1, no. 1, pp. 61–64, 2016, doi: 10.30743/infotekjar.v1i1.43.
N. Aleisa, “A comparison of the 3DES and AES encryption standards,” Int. J. Secur. its Appl., vol. 9, no. 7, pp. 241–246, 2015, doi: 10.14257/ijsia.2015.9.7.21.
V. Chari, “International Journal of Innovative Technology and Exploring Engineering (IJITEE) | Enhanced Reader,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 12, 2019.
M. Imron, I. Ardiansyah, and D. Suhartono, “Implementasi Pengamanan Data Koperasi Menggunakan Algoritma Advanced Encryption Standard ( Aes ),” CITISEE 2016 Proc., pp. 37–40, 2016, [Online]. Available: https://citisee.amikompurwokerto.ac.id/assets/proceedings/paper/8__Amikom_Purwokerto_Implementasi_Pengamanan_Data_Koperasi_Menggunakan_Algoritma_Advanced_Encryption_Standard_(Aes).pdf.
M. H. Arif and A. Z. Fanani, “Kriptografi Hill Cipher Dan Least Significant Bit Untuk Keamanan Pesan Pada Citra,” CSRID (Computer Sci. Res. Its Dev. Journal), vol. 8, no. 1, p. 60, 2016, doi: 10.22303/csrid.8.1.2016.60-72.
S. M. Ankita Verma, Paramita Guha, “Comparative study of different cryptographic algorithms,” Int. J. Emerg. Trends Technol. Comput. Sci., vol. 5, no. 2, pp. 58–63, 2016, [Online]. Available: https://www.researchgate.net/publication/306286725_Comparative_Study_of_Different_Cryptographic_Algorithms/link/57b6ca9208ae2fc031fd6cbc/download.
Sentot Kromodimoeljo, Teori & Aplikasi Kriptografi. 2010.
D. Darwis, “Implementasi Teknik Steganografi Least Significant Bit (LSB) Dan Kompresi Untuk Pengamanan Data Pengiriman Surat Elektronik,” J. Teknoinfo, vol. 10, no. 2, p. 32, 2016, doi: 10.33365/jti.v10i2.8.
E. H. Rachmawanto, K. Prasetyo, C. A. Sari, D. R. I. M. Setiadi, and N. Rijati, “Secured PVD video steganography method based on AES and linear congruential generator,” 2018 Int. Semin. Res. Inf. Technol. Intell. Syst. ISRITI 2018, no. November, pp. 163–167, 2018, doi: 10.1109/ISRITI.2018.8864466.
Y. Asimi, A. Asimi, A. Guezzaz, Z. Tbatou, and Y. Sadqi, “Unpredictable cryptographic primitives for the Robust Wireless Network Security,” Procedia Comput. Sci., vol. 134, no. February 2020, pp. 316–321, 2018, doi: 10.1016/j.procs.2018.07.178.
H. Wijaya, “Implementasi Kriptografi AES-128 Untuk Mengamankan URL (Uniform Resource Locator) dari SQL Injection,” Akad. J., vol. 17, no. 1, pp. 8–13, 2020.
P. Wijaya, M. Damanik, P. Hartati, and I. Gunawan, “Implementasi Enkripsi Dan Deskripsi Data Siak ( Sistem Informasi Administrasi Kependudukan ) Menggunakan Algoritma DES, AES, dan MD5,” TECHSI, vol. 12, 2016.
D. P. Precilia and A. Izzuddin, “Aplikasi Tanda Tangan Digital (Digital Signature) Menggunakan Algoritma Message Digest 5 (MD5),” Energy, vol. 5, no. 1, pp. 14–19, 2016.
I. Sommerville, Software Engineering (9th ed.; Boston, Ed.). Massachusetts: Pearson Education. 2011.
G. B. S. H. J. Rosenblatt, Systems Analysis and Design, vol. 148. 2012.
DOI: https://doi.org/10.30743/infotekjar.v6i2.4346
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Mohammad Imron, Aditiya Pratama

This work is licensed under a Creative Commons Attribution 4.0 International License.
InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan)
Program Studi Teknik Informatika - Universitas Islam Sumatera Utara
Website : http://jurnal.uisu.ac.id/index.php/infotekjar/index
Email : infotekjar@ft.uisu.ac.id
InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan) is licensed under a Creative Commons Attribution 4.0 International License