Implementasi Algoritma Adaptive Huffman Code Dalam Kompresi File Teks Terenkripsi Algoritma Loki97
Abstract
Data security and confidentiality is one of the most important aspects in today's information systems. Due to the rapid development of science and technology that allows the emergence of new techniques, which are misused by certain parties that threaten the security of the information system. The fall of information into the hands of other parties can cause harm to the owner of the information. Therefore we need a way that can provide security for the data, one of which is using cryptographic techniques. Cryptography technique is a science or art in fulfilling security aspects in communicating by changing the content of information into incomprehensible information. One of the algorithms that can be used is the Loki97 algorithm, which is a cryptographic algorithm that uses the Feistel network system. The process carried out in this study is to first encrypt the text file using the Loki97 algorithm, then the results of the encrypted file will be compressed using the Adaptive Huffman Code algorithm, resulting in an encrypted and compressed file.
References
I.M.Kenjibriel, “Enkripsi Data Kunci Simetris Dengan Algoritma Kriptografi LOKI97”, Institut Teknologi Bandung. 2010
D.F.Djusdek, T.Ahmad, et.al, “Pemampatan Citra Keabuan dengan Algoritma Adaptive Huffman dan LZW”, Jurnal Teknik ITS, Vol.V.2016
Z.Amin, “Desain dan Implementasi Tunneling IPSEC Berbasis UNIX dengan ESP (Encapsulating Security Payload)”, STMIK PalComTech, vol.II, pp109-119. 2012
H.Christian, “Studi tentang Pelaksanaan Rencana Kerja Pembangunan Desa Tahun 2013 di Desa Loa Janan Ulu Kecamatan Loa Janan Kabupaten Kutai Kartanegara”, eJournal Pemerintahan Integratif, vol.III, pp. 190-210. 2015
A.Aneta, “Implementasi Kebijakan Program Penanggulangan Kemiskinan Perkotaan (P2KP) di Kota Gorontalo”, Jurnal Administrasi Publik, vol.I, pp. 54-65. 2010
J.Enterprise, Rahasia Manajemen File, Jakarta: PT.Elex Media Komputindo.2010
E. Setyaningsih, Kriptografi & Implementasinyaa Menggunakan Matlab, Yogyakarta: Penerbit Andi.2015
A.A.Ngurah Pradnya Andikha, et.al, “Enkripsi dan Dekripsi Audio Format AMR dengan Algoritma Kriptografi LOKI97”, Jurnal Universitas Udayana. 2010
Hidayat, W.Zarman, et.al, “Implementasi Algoritma Kompresi LZW Pada Database Server”, Jurnal Komputa, vol.II, pp. 7-14. 2013
M. Ardhin, “Adaptive Huffman Coding Sebagai Variasi Huffman Coding”, Jurnal STEI ITB. 2011
H. Delisman, N. Berto dan A. Soeb, “Implementasi Algoritma AES (Advanced Encryption Standard) Untuk Keamanan File Hasil Radiologi di RSU Imelda Medan,” dalam KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Medan, 2020.
F. R. Muhammad, S. Muhammad dan A. Soeb, “Implementasi Pisanc Chiper Untuk Autentikasi Voice Chat,” Journal of Computer System and Informatics (JoSYC), vol. 2, no. 4, pp. 288-294, 2021.
A. Nur dan A. Soeb, “Penerapan Algoritma Elias Omega Code Pada Kompresi File Audio Aplikasi Murottal Muzzamil Hasbalah,” Pelita Informatika: Informasi dan Informatika, vol. 9, no. 2, pp. 113-119, 2020.
A. Soeb dan S. Muhammad, “Pengaman File Video Menggunakan Algoritma Merkle Hellman Knapsack,” JURNAL MEDIA INFORMATIKA BUDIDARMA, vol. 4, no. 2, pp. 461-465, 2020.
M. Tedi, L. G. Guidio, M. Mesran, F. Alwin, A. Soeb dan S. Dodi, “IMPLEMENTASI ALGORITMA J-BIT ENCODING PADA KOMPRESI FILE TEKS,” KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), vol. 1, no. 1, 2017.
A. Muhammad dan A. Soeb, “Penarapan Algoritma Prefix Code Dalam Kompresi File Video,” dalam KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Medan, 2021.
Copyright (c) 2021 Rahmad Syahputra

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


