Integrasi Seni Kuno dan Tantangan Enkripsi Modern melalui Kajian Ulang Teknik Kriptanalisis Al-Kindi
DOI:
https://doi.org/10.15575/hm.v7i2.27845Abstract
References
Al-kazaz, Noor R. Compression-Based Methods for the Automatic Cryptanalysis of Classical Ciphers College of Environmental Sciences and Engineering Compression-Based Methods for the Automatic Cryptanalysis of Classical Noor R . Al-Kazaz. Bangor University, 2020.
Albert Ginting, R. Rizal Isnanto, and Ike Pertiwi Windasari. “Implementasi Algoritma Kriptografi RSA Untuk Enkripsi Dan Dekripsi Email.†Jurnal Teknologi Dan Sistem Komputer 3, no. 2 (2015): 253–58. https://jtsiskom.undip.ac.id/article/view/12009.
Bawono, Hernata Rio Cahyo. “Kriptanalisis Pada Algoritma Cipher Algorithm.†Skripsi, 2015.
Dewanto, Ragil Aria, and Aries Suharso. “Analisis Teknik-Teknik Kriptografi Terhadap Serangan Jaringan Local.†Jurnal Ilmiah Wahana Pendidikan 8, no. 16 (2022): 467–76. https://doi.org/10.5281/zenodo.7068003.
Fajrin, Ricky Maulana, Jalan Kolonel, Wahid Udin, Kayuara Sekayu, and Musi Banyuasin. “Keamanan Data Pada Cloud Computing.†Seminar Nasional Teknologi Informasi, Komunikasi Dan Managemen Palembang-Indonesia 23 (2014).
Faqih, Fauziah Nur, Muhlis Tahir, Zarwanda Ashfarina, and Robby Irsyad. “Efektivitas Peningkatan Keamanan Login Pada Website Menggunakan Enkripsi Caesar Chipper Pendahuluan Peningkatan Teknologi Informasi Dan Internet Telah Membuat Banyak Orang Bergantung.†Adijaya Jurnal Multidisiplin 01, no. 02 (2023): 354–62.
Huda, Choirul, Dadang Iskandar Mulyana, Aji Dwi Prasetyo, and Ali Yafi Zulkarnain. “Implementasi Algoritma One Time Mengggunakan Algoritma Chiper Transposition Sebagai Pengamanan Rahasia Pesan.†Jurnal J-COM (Jurnal … 03, no. 01 (2022): 40–48. https://ejurnalunsam.id/index.php/jicom/article/view/4997%0Ahttps://ejurnalunsam.id/index.php/jicom/article/download/4997/3171.
Kaniawulan, Ismi, M Rafi Muttaqin, and Dhiya Ulhaq. “Sistem Manajemen Pengetahuan Forum Diskusi Dosen Knowledge Management System of Lecturer Discussion Forum.†Jurnal Teknologi Informasi Dan Ilmu Komputer (JTIIK) 7, no. 1 (2020): 51–58. https://doi.org/10.25126/jtiik.202071258.
Kehista, Adisya Poeja, Achmad Fauzi, Annisa Tamara, Ivanida Putri, and Nurul Afni. “Analisis Keamanan Data Pribadi Pada Pengguna E-Commerce : Ancaman , Risiko , Strategi Kemanan ( Literature Review )†4, no. 5 (2023): 625–32.
Kusumaningtyas, Juwita Artanti. “Analisa Algoritma Ciphers Transposition : Study Literature.†Multimatrix I, no. 1 (2018): 1–12. http://jurnal.unw.ac.id:1254/index.php/mm/article/view/152/106.
Laskari, Elena C., G. C. Meletiou, Y. C. Stamatiou, and M. N. Vrahatis. Cryptography and Cryptanalysis through Computational Intelligence. Studies in Computational Intelligence. Vol. 57, 2007. https://doi.org/10.1007/978-3-540-71078-3_1.
Mahto, Dindayal, and Dilip Kumar Yadav. “RSA and ECC,A Comparative Analysis.Pdf.†International Journal of Applied Engineering Research 12, no. 19 (2017): 9053–61.
Ningrum, Desi Fitriani, Muhlis Tahir, Wahyu Dwi Angelina, Eliza Permatasari, Fifi Rinazah Rofiq, Miftakhul Hidayati, Fatimatus Sahroh, Andi Setiawan, and Desifitriani733@gmail.com. “Implementasi Keamanan Data Menggunakan Kriptografi Caesar Chiper Desi.†Adijaya Jurnal Multidisiplin 01, no. 02 (2016): 1–23.
Oktavani, Selli, Fahrizal Rizky, and Indra Gunawan. “Analisis Keamanan Data Dengan Menggunakan Kriptografi Modern Algoritma Advance Encryption Standar ( AES ) JURNAL MEDIA INFORMATIKA [ JUMIN ]†4 (2023): 97–101.
Purnamasari, D, A K Dewi, and A N Trisetiyanto. “Analisis Performansi Kriptografi Berbasis Caesar Cipher Untuk Keamanan Data Menggunakan Python Pada Tembang Macapat.†Journal of Systems 1, no. 2 (2021): 50–54. https://www.e-journal.ivet.ac.id/index.php/jsite/article/view/2079.
Raodia, Raodia. “Pengaruh Perkembangan Teknologi Terhadap Terjadinya Kejahatan Mayantara (Cybercrime).†Jurisprudentie : Jurusan Ilmu Hukum Fakultas Syariah Dan Hukum 6, no. 2 (2019): 39. https://doi.org/10.24252/jurisprudentie.v6i2.11399.
Rauf, Budi Wijaya. “Kombinasi Steganografi Bit Matching Dan Kriptografi Playfair Cipher, Hill Cipher Dan Blowfish.†Jurnal Teknologi Informasi 4, no. 2 (2020): 228–33. https://doi.org/10.36294/jurti.v4i2.1346.
Renaldy, Aldi, Achmad Fauzi, An Nisaa Shabrina, and Hanny Novita Ramadhan. “Peran Sistem Informasi Dan Teknologi Informasi Terhadap Peningkatan Keamanan Informasi Perusahaan.†Jurnal Ilmu Multidisiplin 2, no. 1 (2023): 15–22.
Riadi, Muchlisin. “Pengertian, Sejarah Dan Jenis Kriptografi.†Kajian Pustaka, 2014. https://www.kajianpustaka.com/2014/01/pengertian-sejarah-dan-jenis-kriptografi.html.
Sadikin, Rifki. Kriptografi Untuk Keamanan Jaringan Dan Implementasinya Dalam Bahasa Java. Yogyakarta: Penerbit Andi, 2012.
Sulistyo, Budi. Kriptanalisis Cipher Blok Berdasarkan Permainan Kaotik. Vol. 33204013. Bandung: INSTITUT TEKNOLOGI BANDUNG, 2009.
Suyanto, S. “Keamanan Database Menggunakan Metode Enkripsi.†Jurnal Ilmiah Matrik, no. 12 (2012): 137–50.
Utama, Micky Yudi. “Penerapan Matriks Dalam Kriptografi Hill Cipher.†Informatika ITB, 2016.
Wiharto, Yudi, and Ari Irawan. “Enkripsi Data Menggunakan AES 256.†Jurnal Kilat 7, no. 2 (2018): 91–99.
Yonathan, Febri Dwinata, Helfi Nasution, and Heri Priyanto. “Aplikasi Pengaman Dokumen Digital Menggunakan Algoritma Kriptografi Hybrid Dan Algoritma Kompresi Huffman.†Jurnal Edukasi Dan Penelitian Informatika (JEPIN) 7, no. 2 (2021): 181. https://doi.org/10.26418/jp.v7i2.47077.
Zaini, Ahmad. “Implementasi Algoritma Super Enkripsi Pada Pengaman Pesan Berbentuk Teks.†Skripsi. UNIVERSITAS ISLAM NEGERI MAULANA MALIK IBRAHIM, 2021.
Downloads
Published
How to Cite
Issue
Section
Citation Check
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).