Implementasi Pisanc Chiper Untuk Autentikasi Voice Chat
In securing voice messages, information sent through the internet network must be authenticated for its authenticity, data content, delivery time, and so on. To prevent data manipulation by irresponsible parties, the creation of a data leak that has a negative impact. The occurrence of data leaks that most users are still not aware of. This can happen due to the lack of security of the message itself which results in problems that arise and also losses by certain authoritarian parties. The solution in securing voice messages using modern cryptographic techniques that have been combined with NRZI encoding and the Feistel network by Pisanc Cipher, is a way to maintain the authenticity and accuracy of data or authentication in voice messages. It is useful to look for the characteristics of good encryption, namely confusion and diffusion. This results in a higher level of security. By using the Pisanc Cipher method to secure voice messages, it can generate security and authenticate data to prevent data leakage. In addition, another benefit of using the Pisanc Cipher method is to maintain the authenticity of voice messages.
Usman, "https://www.pengertianmenurutparaahli.net/pengertian-implementasi/," Pengertian Implementasi menurut para ahli, 2002. [Online].
D. N. Novi and E. W. Anang, "PENERAPAN TEKNIK KRIPTOGRAFI STEAM - CHIPER UNTUK PENGAMANAN BASIS DATA," Jurnal Basis Data, vol. Vol. 6, no. No.1, pp. 2-22, 201.
L. Mokh. and A. Putra, "https://docplayer.info/50630911-Enkripsi-dan-dekripsi-pesan-suara-dengan-metode-algoritma-serpent-menggunakan-visual-basic-6-0.html," ENKRIPSI DAN DEKRIPSI PESAN SUARA DENGAN METODE ALGORITMA SERPENT MENGGUNAKAN VISUAL BASIC 6.0. [Online].
P. Arif and N. Nurdin , "ANALISA DAN IMPLEMENTASI KRIPTOGRAFI PADA PESAN RAHASIA MENGGUNAKAN ALGORITMA CIPHER TRANSPOSITION," Jurnal Elektronik Sistem Informasi dan Komputer, vol. Vol.3, no. No.1, pp. 2-11, Januari-Juni 2017.
F. Lazuadi, "http://informatika.stei.itb.ac.id," Kriptografi PISANC CHIPER, 05. 2018-2019. [Online]. [Accessed 01-2019/makalah1 Kriptografi-2019-05.].
E. H. R. D. W. U. d. R. R. S. C. A. Sari, "Penyembunyian Data Untuk Seluruh Ekstansi File Mengguanakan Kriptografi Vernam Cipher dan Bit Shiffing," Journal of Applied Intelligent System, vol. vol.1, pp. 179-190, 2016.
S. M. Melwin Syafrizal, "https://journal.amikom.ac.id/index.php/KIDA/article/download/4475/2170," journal.amikom.ac, pp. 2-13.
s. Fharis , "http://harissitumeangdetektif.apa-itu-cipher-code.html," blogspot.com, 07 2013. [Online].
jakfar, "https://www.scribd.com/document/389239727/Pengertian-Autentikasi," [Online].
"https://www.maxmanroe.com/vid/teknologi/pengertian-chatting.html," Pengertian Chatting dan Contohnya, Fungsi, Serta Manfaatnya. [Online].
S. N, "http://www.pengertianku.net/2015/02/pengertian-chatting-dan-fungsinya-secara-lebih-jelas.html," pengertian-chatting-dan-fungsinya-secara-lebih-jelas., 02 2015. [Online].
D. P. 2, "https://www.dosenpendidikan.com," pengertian-chatting-fungsi-manfaat-dampak/, 10 02 2019.
E. Sutanta, Pengantar Teknologi Informasi, Graha Ilmu., Yogyakarta, 2005.
K. L.V. , "Available:http://www.vbtutor.net/index.php/visual-basic-2010-tutorial/," Visual Basic 2010 Tutorial [online], 6 oktober 2012. [Online].
HEADER AKIB, "Haedar Akib/ Jurnal Administrasi Publik," IMPLEMENTASI KEBIJAKAN:, vol. Volume 1 , no. No. 1 , pp. 2-11, Thn. 2010.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Pisanc Chiper Untuk Autentikasi Voice Chat
Copyright (c) 2021 Muhammad Fajar Rizky, Muhammad Syahrizal, Soeb Aripin
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).