Implementasi Algoritma Xtea (Extended Tyni Encryption Algoritma) Dalam Pengamanan Data File Dokumen Teks
Abstract
At this time the security of the data stored on the computer is necessary, one of which is to secure the document file can be done is cryptography Cryptography techniques can be used one that can be done is encryption, namely the encryption process before the file is sent and the description is the encryption process after the file is received, so that the process can be kept confidential, and only the person concerned can find out. Confidentiality is a service that is used to maintain information from any party that is not authorized to access it. Thus information can only be accessed by those who have the right to guarantee the security of false information.
References
[2] Setyaningsih, Emy, “ Kriptografi dan Implementasi Menggunakan MATLAB”, Andi Yogyakarta, 2015
[3] Munir, Rinaldi, “Kriptografi”, Informatika Bandung, 2006
[4] Kadir, Abdul, “ Konsep dan Implementasi Struktur Data dalam Pemrograman Delphi, Andi Yogyakarta, 2011
[5] Munir, Rinaldi, “Algoritma dan Pemrograman Dalam Bahasa Pascal dan C”, Informatika Bandun, November, 2011.
[6] William, Kandar, Studi Mengenai Tyni Encryptin Algoritmh (TEA) dan Turunan-turunan (XTEA dan XXTEA, Instituti Teknologi Bandung, 2008
[7] http://www.theasciicode.com.ar/
[8] Dodit, Suprianto, Visual Basic 2008 untuk Berbagai Keperluan Pemrograman, Yogyakarta, 2010
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


.png)
.png)


