Perancangan Aplikasi Enkripsi Pada File Suara Menggunakan Algoritma Spritz
Abstract
Issues Security and confidentiality of data is one important aspect in terms of information exchange. One solution to maintain security and confidentiality in the process of sending files with encryption techniques as encryption keys on voice files. This study describes developing cryptography (encryption and decryption) that applies the Spritz algorithm. But not all developments in communication technology have a positive and beneficial impact. One of the negative effects of sound files is data tapping, which is one of the most feared problems by network users and voice files. This research resulted in an application program aimed at preventing the security of sound files on storage media. in making this application, the method used is the Spritz algorithm, because it is very suitable for the security of voice files that result in the completion of the encryption and decryption process. This application was created with visual basic 2008 software and the creation of a file security application using encryption and decryption processes using the Spritz algorithm is expected to overcome these problems. The format used in making this application encrypts and decrypts the sound files that have an extension. WAP, and MP3
Downloads
References
Taronisokhi Zebua, “Encoding the record database of computer based test exam based on spritz algorithm,” Lontar komputer, vol. 9, no. 1 , pp. 52–62, 2018.
Ronald L. Rivest, 2014. “Spritz a spongy RC4-like stream cipher and hash function”. Schuldt Research Institute for Secure Systems AIST, Japan.
Sri Widianti, “Pengantar Basis Data”,Yogyakarta, Informatika, 2000.
Arius, D. 2008, “Awal Sejarah Kriptografi Didunia”, STMIK AMIKOM, Yogyakarta.
Munir, R., 2006, “Kriptografi”, Informatika, Bandung.
Nurasyiah, “Perancangan Aplikasi Kompresi File audio” ,Jakarta, Andi, 2013.
Sadikin,R. 2012. “Kriptografi Untuk Keamanan Jaringan dan Implementasinya Dalam Bahasa Java”. C.V. ANDI OFFISET, Yogyakarta.
Ariyus, Dony. & Andri Rum, 2008. “KODE ASCII 7 BIT”. Jurusan Teknik Informatika, STMIK AMIKOM, Yogyakarta.
Yuri ariyanto, 2009. “Algoritma RC4 Dalam Protekisi Transmisi Dan Hasil Query Untuk ORDBMS POSTGRESQL”. Jurnal Informatika, Vol.10, No. 1 53 – 59.
Jogiyanto.HM. 2005.”Analisis dan Desain Sistem Informasi”, ANDI. Yogyakarta
Adi Nugroho, 2010,”Rekayasa Perangkat Lunak menggunakan UML dan Java”, penerbit ANDI : Yogyakarta
Priyanto, Rahmat, 2009, “Langsung Bisa Visual Basic.Net 2008” ,Penerbit ANDI, Yogyakarta.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Perancangan Aplikasi Enkripsi Pada File Suara Menggunakan Algoritma Spritz
Pages: 103-108
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















