Penerapan Algoritma Gronsfeld Dengan Pembangkit Kunci Quicksort Untuk Mengamankan Pesan Rahasia


  • Ria Ramadhani Syahputri Universitas Budi Darma, Medan, Indonesia
  • Mesran Mesran * Mail Universitas Budi Darma, Medan, Indonesia
  • Murdani Murdani Universitas Budi Darma, Medan, Indonesia
  • (*) Corresponding Author
Keywords: Cryptography; Gronsfeld Cipher; Quicksort; Secret Message; Encryption

Abstract

The numerous issues often encountered in securing confidential messages revolve around message leaks. Message leaks occur through various means, such as eavesdropping. Eavesdropping happens when unauthorized parties manage to access and obtain information from ongoing communications. One way to maintain the confidentiality of secret messages is through encryption and decryption, known as cryptography, achieved by transforming the original message (plaintext) into a secret message (ciphertext). In this study, the results of the encrypted character ciphertext are v, v, w, ^, ™, ʽ, ¦, ¥, -, ¼, Ý, ó, ⁒, x, [], ", [], #, S, a, I, p, p. These findings can serve as an alternative solution to safeguard message confidentiality, ensuring only the message owner and those with knowledge of the key can access it. The Gronsfeld Cipher cryptographic method can also enhance the security of the Quicksort algorithm, a cryptographic algorithm, by generating a more randomized text message that does not reveal patterns connecting it to the original text message.

Downloads

Download data is not yet available.

References

Y. Tumanggor, R. Maya, F. Lubis, M. P. Sianturi, and R. G. Purba, “Metode Algoritma Bubble Sort , Algoritma Merge Sort Dan Algoritma Quick Sort Dalam Pengujian Pengujian Perbandingan Proses Penelitian Kualitatif,” J. Tek. Inform. Komput. Univers., vol. 2, no. 2, pp. 47–58, 2022.

Y. Y. P. Rumapea, “Analisis Perbandingan Metode Algoritma Quick Sort Dan Merge Sort Dalam Pengurutan Data Terhadap Jumlah Langkah Dan Waktu,” J. Method., vol. 3, no. 2, pp. 2442–7861, 2017.

Z. Ramadhan and A. P. U. Siahaan, “Protection of Important Data and Information using Gronsfeld Cipher,” Int. J. Innov. Res. Multidiscip. F., vol. 4, no. 10, pp. 6–10, 2018, doi: 10.31227/osf.io/uq7nt.

M. Luthfi Zulfa, B. Nurina Sari, and U. Singaperbangsa Karawang Abstract, “Analisis Perbandingan Algoritma Bubble Sort, Shell Sort, dan Quick Sort dalam Mengurutkan Baris Angka Acak menggunakan Bahasa Java,” J. Ilm. Wahana Pendidik., vol. 2022, no. 13, pp. 237–246, 2022, [Online]. Available: https://doi.org/10.5281/zenodo.6962346

A. L. Noviani and I. Yuliani, “Perancangan Perangkat Lunak Kriptografi Menggunakan Gronsfeld Cipher, Vernam Cipher dan Ron Code 4 Stream Cipher,” Enter, vol. 2, pp. 549–559, 2019.

M. R. Hasibuan, “Implementasi Algoritma Quicksort Untuk Pembangkitan Kunci Algoitma RSA Pada Pengamanan Data Audio,” vol. 2, no. 1, pp. 18–25, 2022.

dkk 2018 ) richard oliver ( dalam Zeithml., “d.richard oliver,” Angew. Chemie Int. Ed. 6(11), 951–952., pp. 2013–2015, 2021.

N. D. M. Veronica and Y. Darnita, “Rancang Bangun Aplikasi Tes Toefl Menggunakan Algoritma Quick Sort Berbasis Komputer,” Pseudocode, vol. 2, no. 2, pp. 89–97, 2015, doi: 10.33369/pseudocode.2.2.89-97.

A. Miftachul, I. Al Amin Husni, and J. Wibowo Sasongko, “Implementasi Metode Quick Sort Dalam Sistem Pemeriksaan Pasien Klinik Fisioterapi Widya Husada Semarang,” vol. 3, no. 2019, pp. 326–331, 2019.

S. Kriptokompresi, M. Metode, G. Code, D. A. N. Algoritma, G. Cipher, and P. File, “Indriyani Angelina, Sistem kriptokompresi menggunakan metode goldbach code dan algoritma simetris gronsfeld cipher pada file text,” 2022.

M. KE, “Panny Agustia Rahayuningsih,"analisa perbandingan kompleksitas algoritma pengurutan nilai (sorting)" jurnal Vol.4, No.2,2016,” vol. 147, no. March, pp. 11–40, 2016.

I. Algoritma, Q. Untuk, P. Kunci, A. Rsa, and P. D. Audio, “PENGAMANAN DATA AUDIO,” 2020.

A. Rohmanu, “METODE ALGORITMA DES DAN METODE END OF FILE Ajar Rohmanu,” J. Inform., vol. 2, no. 1, pp. 1–11, 2017.

A. Ginting, R. R. Isnanto, and I. P. Windasari, “Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email,” J. Teknol. dan Sist. Komput., vol. 3, no. 2, p. 253, 2015, doi: 10.14710/jtsiskom.3.2.2015.253-258.

T. Limbong, “Pengujian Kriptografi Klasik Caesar Chipper Menggunakan Matlab,” Semin. Nas. Inov. dan Teknol. Inf. Sept., no. September 2015, pp. 77–80, 2015.

D. R. Poetra, “Performa Algoritma Bubble Sort dan Quick Sort pada Framework Flutter dan Dart SDK(Studi Kasus Aplikasi E-Commerce),” JATISI (Jurnal Tek. Inform. dan Sist. Informasi), vol. 9, no. 2, pp. 806–816, 2022, doi: 10.35957/jatisi.v9i2.1886.

P. T. Informatika, U. B. Darma, and P. Teks, “Implementasi Algoritma Quicksort Untuk Pembangkitan Kunci Algoritma Elgamal Pada Pengamanan Data File Dokumen,” vol. 1, no. 1, pp. 17–24, 2022.

K. V. Sedana, I. K. A. Mogi, I. B. G. Dwidasmara, I. G. A. Wibawa, C. R. A. Pramartha, and L. G. Astuti, “Implementasi Algoritma Gronsfeld Cipher dan Steganografi End Of File Untuk Pengamanan Data,” JELIKU (Jurnal Elektron. Ilmu Komput. Udayana), vol. 11, no. 1, p. 129, 2022, doi: 10.24843/jlk.2022.v11.i01.p14.

M. A. Pratama, A. Desiani, and Irmeilyana, “Analisis Kebutuhan Waktu Algoritma InsertionSort, Merge Sort, dan Quick Sort denganKompleksitas Waktu,” Comput. Sci. ICT, vol. ISBN, no. 1, pp. 31–34, 2017.

B. O. Sinaga, D. Almahera, S. Wahyuni, I. Saputra, A. Gronsfeld, and A. D. A. N. Pembahasan, “Pengamanan File Docx Menerapkan Algoritma Gronsfeld,” pp. 415–419, 2020.

D. Iqbal, A. R. Panggabean, I. W. Sinaga, and ..., “Implementasi Algoritma RC4+ Untuk Mengamankan Pesan Teks Pada Aplikasi Chatting,” … Teknol. Komput. …, pp. 916–920, 2019, [Online]. Available: http://seminar-id.com/prosiding/index.php/sainteks/article/view/254

S. Maulidin, “Rancangan Sistem Keamanan Algoritma Gronsfeld Cipher dengan Pembangkit Bilangan Acak LCG (Linear Congruential Generator),” J. Panca Budi, vol. 1, no. 1, pp. 20–22, 2021, [Online]. Available: http://jurnal.pancabudi.ac.id/index.php/fastek/article/view/1891


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Penerapan Algoritma Gronsfeld Dengan Pembangkit Kunci Quicksort Untuk Mengamankan Pesan Rahasia

Dimensions Badge
Article History
Submitted: 2023-08-15
Published: 2023-08-31
Abstract View: 480 times
PDF Download: 372 times
Section
Articles