Penerapan Metode Simple Columnar Transposition (SCTR) untuk Aplikasi Enkripsi Teks Berbasis Android
DOI:
https://doi.org/10.32493/informatika.v6i1.9670Keywords:
Android, Encryption, Cryptography, Simple Columnar Transposition (SCTR)Abstract
The development of communication technology such as the use of mobile phones based on android. Android has the capability of getting good as personal computer and it has a large storage area. Android users use it to store important data. Critical data that is stored to make various ways to membobolnya. The role of cryptography is indispensable for securing the data. Cryptography is the science to encode a message, while to keep the message or document is secure and cannot be read by those who are not entitled to use encryption. The application of encryption uses a symmetric algorithm. On the application of this method used is Simple Columnar Transposition method. Simple Columnar Transposition method by dividing plainteks into blocks with a key length (k) certain then these blocks are arranged in the form of rows and columns. The making of this application using the JAVA programming language and XML. The application is made for a mobile with Android using the Studio. This application was eventually shown on android mobile phone users. The application used to encode text/sentence, the result of encryption in the form of chipertext, and the result of decrypting plaintext form.References
Efrandi, A. &. (2014). Aplikasi Kriptografi Pesan Menggunakan Algoritma Vigenere Cipher. Jurnal Media Infotama, 120-128, ISSN 1858 – 2680, Vol.2.
Enterprise, J. (2015). Mengenal Dasar-Dasar Pemrograman Android. Jakarta: PT Elex Media Komputindo.
H, N. S. (2012). Pemrograman Aplikasi Mobile Smartphone dan Table PC Berbasis Android. Bandung: Informatika.
Mukhtar, H. (2018). Kriptografi Untuk Keamanan Data. Sleman: CV Budi Utama.
Muslimin, D. B., Kusmanto, D., Amilia, K. F., Ariffin, M. S., Mardiana, S., & Yulianti, Y. (2020). Pengujian Black Box pada Aplikasi Sistem Informasi Akademik Menggunakan Teknik Equivalence Partitioning. Jurnal Informatika Universitas Pamulang, 5(1), 19-25. doi:10.32493/informatika.v5i1.3778
Muttaqin, Z. (2010). Pembuatan Aplikasi Enkripsi Menggunakan Metode Advance Encryption Standard dan Rivest Shamir Adleman. Jakarta: UIN Syarif Hidayatullah.
Pratama, B. P., Ristianto, I. B., Prayogo, I. A., Nasrullah, & Saifudin, A. (2020). Pengujian Perangkat Lunak Sistem Informasi Penilaian Mahasiswa dengan Teknik Boundary Value Analysis Menggunakan Metode Black Box Testing. Journal Of Artificial Intelligence And Innovative Applications, 32-36.
Sadikin, R. (2012). Kriptografi Untuk Keamanan Jaringan. Yogyakarta: CV ANDI OFFSET.
Sianipar. (2013). Teori dan Implementasi Java. Bandung: Informatika.
Warno. (2012). Pembelajaran Pemrograman Bahasa Java dan Arti Keyword. Jurnal, Universitas Indraprasta PGRI, , Jakarta Selatan, , 65-70.
Wulandari, T. (2017, Maret 04). Simbol – Simbol Flowchart Standard yang Dikeluarkan ANSI. Retrieved from http://www.academia.edu: http://www.academia.edu/4686454/Simbol
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Jurnal Informatika Universitas Pamulang have CC-BY-NC or an equivalent license as the optimal license for the publication, distribution, use, and reuse of scholarly work.
In developing strategy and setting priorities, Jurnal Informatika Universitas Pamulang recognize that free access is better than priced access, libre access is better than free access, and libre under CC-BY-NC or the equivalent is better than libre under more restrictive open licenses. We should achieve what we can when we can. We should not delay achieving free in order to achieve libre, and we should not stop with free when we can achieve libre.
Jurnal Informatika Universitas Pamulang is licensed under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)
YOU ARE FREE TO:
- Share : copy and redistribute the material in any medium or format
- Adapt : remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms