Pembuatan Aplikasi Pengamanan Data dengan Metode MARS

Elizabeth Nathania Witanto(1*), Gregorius Satia Budhi(2), Kristo Radion Purba(3),


(1) Program Studi Teknik Informatika
(2) Program Studi Teknik Informatika
(3) Program Studi Teknik Informatika
(*) Corresponding Author

Abstract


Nowadays, technology is growing rapidly and becoming more sophisticated, especially communications technology. Information can be deployed without having to meet each other. No doubt that any confidential information sent over the Internet. Through various types of information is developing techniques for damage or maintaining the security of the dissemination of information on the internet.
Securing data by using cryptography is needed for sending confidential data so that not everyone can access it. Process undertaken in this study is encrypted messages with MARS method. Input in an application that is designed in the form of plaintext messages or files to be encrypted, then the key to encrypt the message. This application is made with the Java programming language using NetBeans IDE 7.4.
The test results indicate that the encryption with MARS method can be performed on any type of file (example: text file, song or audio file, video file or movie, etc.). Files can be decrypted back to normal if the password is the same as the password for the encryption.

Keywords


Data Security, Cryptography, MARS.

Full Text:

PDF

References


Coppersmith, D. 1999. The MARS Encryption Algorithm. Retrieved May 22, 2014, from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.35.5887&rep=rep1&type=pdf

Cryptographic Competitions. (2014). AES: the Advanced Encryption Standard. Retrieved May 22, 2014, from http://competitions.cr.yp.to/aes.html

Djebbar, F., Ayad, B., Meraim, K. A., & Hamam, H. (2014). Comparative Study of Digital Audio Steganography Techniques. 4. Retrieved May 22, 2014, from http://biblio.telecom-paristech.fr/cgi-bin/download.cgi?id=12699

Ilmy, M. 2014. Perbandingan Algoritma Mars Dan Rijndael Dalam Beberapa Mode Operasi Cipher Blok. Retrieved May 18, 2014, from http://informatika.stei.itb.ac.id/~rinaldi.munir/Kriptografi/2006-2007/Makalah1/Makalah1-034.pdf.

Rojali. 2013. Kriptografi dan Steganografi. Retrieved May 29, 2014, from http://socs.binus.ac.id/2013/07/30/kriptografi-dan-steganografi/

Sadikin, R. 2012. Kriptografi untuk Keamanan Jaringan. Yogyakarta: Penerbit ANDI.

Stallings, W. 2011. Cryptography and Network Security 5th Edition. USA: Prentice Hall


Refbacks

  • There are currently no refbacks.


Jurnal telah terindeks oleh :