Penerapan Algoritma Gronsfeld Dengan Pembangkit Kunci Quicksort Untuk Mengamankan Pesan Rahasia
Abstract
The numerous issues often encountered in securing confidential messages revolve around message leaks. Message leaks occur through various means, such as eavesdropping. Eavesdropping happens when unauthorized parties manage to access and obtain information from ongoing communications. One way to maintain the confidentiality of secret messages is through encryption and decryption, known as cryptography, achieved by transforming the original message (plaintext) into a secret message (ciphertext). In this study, the results of the encrypted character ciphertext are v, v, w, ^, ™, ʽ, ¦, ¥, -, ¼, Ý, ó, ⁒, x, [], ", [], #, S, a, I, p, p. These findings can serve as an alternative solution to safeguard message confidentiality, ensuring only the message owner and those with knowledge of the key can access it. The Gronsfeld Cipher cryptographic method can also enhance the security of the Quicksort algorithm, a cryptographic algorithm, by generating a more randomized text message that does not reveal patterns connecting it to the original text message.
Downloads
References
Y. Tumanggor, R. Maya, F. Lubis, M. P. Sianturi, and R. G. Purba, “Metode Algoritma Bubble Sort , Algoritma Merge Sort Dan Algoritma Quick Sort Dalam Pengujian Pengujian Perbandingan Proses Penelitian Kualitatif,” J. Tek. Inform. Komput. Univers., vol. 2, no. 2, pp. 47–58, 2022.
Y. Y. P. Rumapea, “Analisis Perbandingan Metode Algoritma Quick Sort Dan Merge Sort Dalam Pengurutan Data Terhadap Jumlah Langkah Dan Waktu,” J. Method., vol. 3, no. 2, pp. 2442–7861, 2017.
Z. Ramadhan and A. P. U. Siahaan, “Protection of Important Data and Information using Gronsfeld Cipher,” Int. J. Innov. Res. Multidiscip. F., vol. 4, no. 10, pp. 6–10, 2018, doi: 10.31227/osf.io/uq7nt.
M. Luthfi Zulfa, B. Nurina Sari, and U. Singaperbangsa Karawang Abstract, “Analisis Perbandingan Algoritma Bubble Sort, Shell Sort, dan Quick Sort dalam Mengurutkan Baris Angka Acak menggunakan Bahasa Java,” J. Ilm. Wahana Pendidik., vol. 2022, no. 13, pp. 237–246, 2022, [Online]. Available: https://doi.org/10.5281/zenodo.6962346
A. L. Noviani and I. Yuliani, “Perancangan Perangkat Lunak Kriptografi Menggunakan Gronsfeld Cipher, Vernam Cipher dan Ron Code 4 Stream Cipher,” Enter, vol. 2, pp. 549–559, 2019.
M. R. Hasibuan, “Implementasi Algoritma Quicksort Untuk Pembangkitan Kunci Algoitma RSA Pada Pengamanan Data Audio,” vol. 2, no. 1, pp. 18–25, 2022.
dkk 2018 ) richard oliver ( dalam Zeithml., “d.richard oliver,” Angew. Chemie Int. Ed. 6(11), 951–952., pp. 2013–2015, 2021.
N. D. M. Veronica and Y. Darnita, “Rancang Bangun Aplikasi Tes Toefl Menggunakan Algoritma Quick Sort Berbasis Komputer,” Pseudocode, vol. 2, no. 2, pp. 89–97, 2015, doi: 10.33369/pseudocode.2.2.89-97.
A. Miftachul, I. Al Amin Husni, and J. Wibowo Sasongko, “Implementasi Metode Quick Sort Dalam Sistem Pemeriksaan Pasien Klinik Fisioterapi Widya Husada Semarang,” vol. 3, no. 2019, pp. 326–331, 2019.
S. Kriptokompresi, M. Metode, G. Code, D. A. N. Algoritma, G. Cipher, and P. File, “Indriyani Angelina, Sistem kriptokompresi menggunakan metode goldbach code dan algoritma simetris gronsfeld cipher pada file text,” 2022.
M. KE, “Panny Agustia Rahayuningsih,"analisa perbandingan kompleksitas algoritma pengurutan nilai (sorting)" jurnal Vol.4, No.2,2016,” vol. 147, no. March, pp. 11–40, 2016.
I. Algoritma, Q. Untuk, P. Kunci, A. Rsa, and P. D. Audio, “PENGAMANAN DATA AUDIO,” 2020.
A. Rohmanu, “METODE ALGORITMA DES DAN METODE END OF FILE Ajar Rohmanu,” J. Inform., vol. 2, no. 1, pp. 1–11, 2017.
A. Ginting, R. R. Isnanto, and I. P. Windasari, “Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email,” J. Teknol. dan Sist. Komput., vol. 3, no. 2, p. 253, 2015, doi: 10.14710/jtsiskom.3.2.2015.253-258.
T. Limbong, “Pengujian Kriptografi Klasik Caesar Chipper Menggunakan Matlab,” Semin. Nas. Inov. dan Teknol. Inf. Sept., no. September 2015, pp. 77–80, 2015.
D. R. Poetra, “Performa Algoritma Bubble Sort dan Quick Sort pada Framework Flutter dan Dart SDK(Studi Kasus Aplikasi E-Commerce),” JATISI (Jurnal Tek. Inform. dan Sist. Informasi), vol. 9, no. 2, pp. 806–816, 2022, doi: 10.35957/jatisi.v9i2.1886.
P. T. Informatika, U. B. Darma, and P. Teks, “Implementasi Algoritma Quicksort Untuk Pembangkitan Kunci Algoritma Elgamal Pada Pengamanan Data File Dokumen,” vol. 1, no. 1, pp. 17–24, 2022.
K. V. Sedana, I. K. A. Mogi, I. B. G. Dwidasmara, I. G. A. Wibawa, C. R. A. Pramartha, and L. G. Astuti, “Implementasi Algoritma Gronsfeld Cipher dan Steganografi End Of File Untuk Pengamanan Data,” JELIKU (Jurnal Elektron. Ilmu Komput. Udayana), vol. 11, no. 1, p. 129, 2022, doi: 10.24843/jlk.2022.v11.i01.p14.
M. A. Pratama, A. Desiani, and Irmeilyana, “Analisis Kebutuhan Waktu Algoritma InsertionSort, Merge Sort, dan Quick Sort denganKompleksitas Waktu,” Comput. Sci. ICT, vol. ISBN, no. 1, pp. 31–34, 2017.
B. O. Sinaga, D. Almahera, S. Wahyuni, I. Saputra, A. Gronsfeld, and A. D. A. N. Pembahasan, “Pengamanan File Docx Menerapkan Algoritma Gronsfeld,” pp. 415–419, 2020.
D. Iqbal, A. R. Panggabean, I. W. Sinaga, and ..., “Implementasi Algoritma RC4+ Untuk Mengamankan Pesan Teks Pada Aplikasi Chatting,” … Teknol. Komput. …, pp. 916–920, 2019, [Online]. Available: http://seminar-id.com/prosiding/index.php/sainteks/article/view/254
S. Maulidin, “Rancangan Sistem Keamanan Algoritma Gronsfeld Cipher dengan Pembangkit Bilangan Acak LCG (Linear Congruential Generator),” J. Panca Budi, vol. 1, no. 1, pp. 20–22, 2021, [Online]. Available: http://jurnal.pancabudi.ac.id/index.php/fastek/article/view/1891
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Penerapan Algoritma Gronsfeld Dengan Pembangkit Kunci Quicksort Untuk Mengamankan Pesan Rahasia
Pages: 985-996
Copyright (c) 2023 Ria Ramadhani Syahputri, Mesran Mesran, Murdani Murdani

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















