Pembuatan Aplikasi Pengamanan Data dengan Metode MARS
Keywords:
Kinerja, Supply Chain, CollaborationAbstract
Nowadays, technology is growing rapidly and becoming more sophisticated, especially communications technology. Information can be deployed without having to meet each other. No doubt that any confidential information sent over the Internet. Through various types of information is developing techniques for damage or maintaining the security of the dissemination of information on the internet.Securing data by using cryptography is needed for sending confidential data so that not everyone can access it. Process undertaken in this study is encrypted messages with MARS method. Input in an application that is designed in the form of plaintext messages or files to be encrypted, then the key to encrypt the message. This application is made with the Java programming language using NetBeans IDE 7.4.
The test results indicate that the encryption with MARS method can be performed on any type of file (example: text file, song or audio file, video file or movie, etc.). Files can be decrypted back to normal if the password is the same as the password for the encryption.
References
[1] Coppersmith, D. 1999. The MARS Encryption Algorithm. Retrieved May 22, 2014, from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.35.5887&rep=rep1&type=pdf
[2] Cryptographic Competitions. (2014). AES: the Advanced Encryption Standard. Retrieved May 22, 2014, from http://competitions.cr.yp.to/aes.html
[3] Djebbar, F., Ayad, B., Meraim, K. A., & Hamam, H. (2014). Comparative Study of Digital Audio Steganography Techniques. 4. Retrieved May 22, 2014, from http://biblio.telecom-paristech.fr/cgi-bin/download.cgi?id=12699
[4] Ilmy, M. 2014. Perbandingan Algoritma Mars Dan Rijndael Dalam Beberapa Mode Operasi Cipher Blok. Retrieved May 18, 2014, from http://informatika.stei.itb.ac.id/~rinaldi.munir/Kriptografi/2006-2007/Makalah1/Makalah1-034.pdf.
[5] Rojali. 2013. Kriptografi dan Steganografi. Retrieved May 29, 2014, from http://socs.binus.ac.id/2013/07/30/kriptografi-dan-steganografi/
[6] Sadikin, R. 2012. Kriptografi untuk Keamanan Jaringan. Yogyakarta: Penerbit ANDI.
[7] Stallings, W. 2011. Cryptography and Network Security 5th Edition. USA: Prentice Hall