Analisis dan Perancangan Sistem Kriptografi Merkle-Hellman Knapsack Untuk Mengamankan File Text
Abstract
Cryptography is a field that is really needed in the current era of globalization where security and confidentiality of information are very difficult to maintain considering wide and open communication access. Cryptography currently has a variety of methods and techniques which are divided into two categories, namely symmetric cryptography and asymmetric cryptography where their use depends on needs and conditions. The Merkle Hellman Knapsack method is an asymmetric cryptography method that uses a public key and a private key so that tapping and cracking becomes more difficult due to the use of different keys both during encryption and during decryption. Application development using the Merkle Hellman Knapsack method generates public keys and private keys using super increasing and inverse modulo series values, making the cryptanalysis process more difficult. The system developed is able to provide an alternative in securing text data.
References
2Sistem Sujono1, Okkita Rizan2, Hamidah3, Harrizkie Arie Pradana4 1, “PELATIHAN SIMULASI JARINGAN KOMPUTER UNTUK PERSIAPAN UJI KOMPETENSI SISWA SMKN 1 PAYUNG,” vol. 2, hal. 17–22, 2021.
K. J. Asyar, “DASAR JARINGAN KOMPUTER,” no. May, 2022.
A. I. Zidan BP Tafakur, *Sakina Sudinb, “Aplikasi Enkripsi dan Dekripsi Menggunakan Metode Triple Transppsition Viginere Cipher,” vol. 2617, no. 2, hal. 21–27, 2022.
AMELIA VEGA, “ENKRIPSI DAN DEKRIPSI PESAN MENGGUNAKAN POLINOMIAL GALOIS FIELD DENGAN ALGORITMA HILL CIPHER,” vol. 9, hal. 356–363, 2022.
D. R. Sari dan A. I. Pawelloi, “Penerapan Kriptografi Pada File Teks Dengan Menggunakan Merkle Hellman Knapsack Berbasis Android,” J. Sintaks Log., vol. 2, no. 3, hal. 1–10, 2022, doi: 10.31850/jsilog.v2i3.1845.
Y. Prie, N. Zalukhu, F. T. Waruwu, dan H. K. Siburian, “Penyisipan Pesan Terenkripsi Affine Chiper Pada Citra Digital Dengan Menggunakan Metode Pixel Value Differencing,” vol. 01, no. 04, hal. 22–33, 2024.
B. Dina, D. I. Mulyana, dan J. S. Hutagalung, “Algoritma ADFGVX Product Transposition Cipher Pada Pengenkripsian Pesan Text,” J. Pendidik. Sains dan Komput., vol. 2, no. 01, hal. 172–183, 2022, doi: 10.47709/jpsk.v2i01.1378.
M. Fadlan dan H. Hadriansa, “Rekayasa Aplikasi Kriptografi dengan Penerapan Kombinasi Algoritma Knapsack Merkle Hellman dan Affine Cipher,” J. Teknol. Inf. dan Ilmu Komput., vol. 4, no. 4, hal. 268–274, 2017, doi: 10.25126/jtiik.201744468.
R. Maulana dan R. M. Simanjorang, “Implementasi Kriptografi Pengamanan Data Pribadi Siswa SMA Swasta Jaya Krama Beringin Dengan Algoritma RC4,” J. Nas. Komputasi dan Teknol. Inf., vol. 4, no. 6, hal. 377–383, 2021, doi: 10.32672/jnkti.v4i6.3533.
N. S. Dewi, A. Amri, dan S. Safriadi, “Pengamanan Data Teks Pada Aplikasi Chatting Menggunakan Metode Modular Multiplication Based Block Chiper (MMB) Berbasis Android,” J. Artif. Intell. Softw. Eng., vol. 2, no. 2, hal. 1–7, 2022, doi: 10.30811/jaise.v2i2.3881.
M. A. Jayana, D. Rafael, dan A. A. Rahman, “Implementasi Pengamanan Data Pengarsipan Dengan Metode Algoritma Kriptografi Aes Studi Kasus Pada Bank Bjb Kcp Pasteur Bandung,” Pros. Semin. Sos. Polit. Bisnis, Akunt. dan Tek., vol. 4, hal. 184, 2022, doi: 10.32897/sobat.2022.4.0.1922.
C. Chandra, “Keamanan Data Dengan Metode Kriptografi Kunci Publik,” J. TIMES, vol. 5, no. 2, hal. 11–15, 2016, doi: 10.51351/jtm.5.2.2016548.
a Hidayat, R. Rosyadi, dan E. Paulus, “Aplikasi Merkle-Hellman Knapsack Untuk Kriptografi File Teks,” Prosiding-Seminar Nas. …, vol. 2, no. November, hal. 26–27, 2018, [Daring]. Tersedia pada: http://senter.ee.uinsgd.ac.id/repositori/index.php/prosiding/article/view/senter2016p23
K. E. WIDYASARI, “PERBANDINGAN ALGORITMA RSA DAN MERKLE-HELLMAN DALAM RANCANG BANGUN APLIKASI PENYANDIAN PESAN TEKS,” hal. 6, 2022.
C. A. Novianti, M. Khudzaifah, dan M. N. Jauhari, “Kriptografi Hibrida Cipher Block Chaining (CBC) dan Merkle-Hellman Knapsack untuk Pengamanan Pesan Teks,” J. Ris. Mhs. Mat., vol. 3, no. 1, hal. 10–25, 2023, doi: 10.18860/jrmm.v3i1.22292.
Fatonah dan Dadang Iskandar Mulyana, “Implementasi Metode Rivest Shamir Adleman untuk Enkripsi dan Dekripsi Text,” J. Inform. dan Teknol. Komput. ( J-ICOM), vol. 3, no. 1, hal. 32–39, 2022, doi: 10.33059/j-icom.v3i1.4990.
A. Aminudin, A. F. Helmi, dan S. Arifianto, “Analisa Kombinasi Algoritma Merkle-Hellman Knapscak dan Logaritma Diskrit pada Aplikasi Chat,” J. Teknol. Inf. dan Ilmu Komput., vol. 5, no. 3, hal. 325, 2018, doi: 10.25126/jtiik.201853844.
A. Usman, Y. D. Lestari, P. Studi, T. Informatika, U. Harapan, dan K. Buatan, “PEMODELAN GERAKAN CHESS KNIGHT DALAM MASALAH,” vol. 6, no. 01, 2024.
R. S. Sinukun, R. Pakaya, dan S. Suleman, “Perancangan Sistem Informasi Perjalanan Dinas (SIMPERNAS) Menggunakan Metode UML,” Energy - J. Ilm. Ilmu-Ilmu Tek., vol. 12, no. 1, hal. 18–24, 2022, doi: 10.51747/energy.v12i1.1040.
J. R. Fauzi, “Algoritma Dan Flowchart Dalam Menyelesaikan Suatu Masalah Disusun Oleh Universitas Janabadra Yogyakarta 2020,” J. Tek. Inform., no. 20330044, hal. 4–6, 2020.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Analisis dan Perancangan Sistem Kriptografi Merkle-Hellman Knapsack Untuk Mengamankan File Text
Pages: 93 - 103
Copyright (c) 2024 Arief Budiman, Yunita Sari

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


