Perbandingan Algoritma RC4+ dan RC4a dalam Pengamanan File Teks
DOI:
https://doi.org/10.47065/bulletincsr.v1i3.91Keywords:
RC4 Algorithm; RC4A Algorithm; CryptographyAbstract
Along with the development of technology, documents that are supposed to be confidential can be accessed by unauthorized people. So safeguards are needed to prevent information from reaching unauthorized hands. The security of a text becomes reduced or insecure in terms of storage. It does not cover the possibility of a third party changing or taking the text, then the text is encoded into codes that are not understood, so that if there is a third party who wants to change it will have difficulty translating the actual content of the text and must decrypt it first. The security of encrypting text files, to avoid this problem, it is necessary to carry out a process of hiding or disguising information in such a way that it does not fall to other unauthorized parties. In this study, comparing the RC4 + Algorithm and the RC4A Algorithm in securing text files. Text file security application to help solve security problems of data created or stored using files that are formatted such as doc, txt
Downloads
References
Dani Iqbal, Asep Roy Panggabean, Indra Williamsyah Sinaga, Taronisokhi Zebua, 2019. Implementasi Algoritm RC4+ Untuk Mengamankan Pesan Teks Pada Aplikasi Chatting. (SAINTEKS), AMIK STIEKOM, Sumatera Utara
Nur hayati, Mohammad Andri Budiman, Amer Sharif, 2017. Implementasi Algoritma RC4A dan MD5 Untuk Menjamin Confidentiality dan Integrity Pada File Teks. (Sinkron), Jurnal & Penelitian Teknik Informatika. POLITEKNIK GANESHA Medan.
Shaw, M. E. dan Costanzo, P. R. 1982. Theories of Social Psychology, Second Edition. Tokyo: McGraw-Hill Kogakusha, Ltd.
Munir, R., 2006, Kriptografi, Informatika, Bandung.
Arius, D. 2008, Awal Sejarah Kriptografi Didunia, STMIK AMIKOM, Yogyakarta.
Ariyus, Dony. & Andri Rum, 2008. KODE ASCII 7 BIT. Jurusan Teknik Informatika, STMIK AMIKOM Yogyakarta.
Eko Aribowo, 2008. Pengamanan Document Office Dengan Algoritma Kriptografi Kunci Asimetris Elgamal. Jurnal Informatika, Vol.2 No.2 : Yogyakarta.
Adi Nugroho, 2010, Rekayasa Perangkat Lunak menggunakan UML dan Java, penerbit ANDI : Yogyakarta
Rossa A. S, M. Shalahuddin 2011, Rekayasa Perangkat Lunak Terstruktur dan Berorientasi Objek. Penerbit ANDI, Yogyakarta
Priyanto, Rahmat, 2009, Langsung Bisa Visual Basic.Net 2008 ,Penerbit, ANDI, Yogyakarta.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Perbandingan Algoritma RC4+ dan RC4a dalam Pengamanan File Teks
ARTICLE HISTORY
How to Cite
Issue
Section
Copyright (c) 2021 Lisa Oktasari

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).













