Modifikasi Pembentukan Algoritma Rc4 Cipher Dengan Metode Acak Mid-Square Technique Untuk Pengamanan Voice Chat
Abstract
Technological developments and human lifestyles allow access to information systems in new ways, for example using online conversations (chat) via an internet connection, which is often in the form of text communication (text chat) or voice (voice chat). Instant messaging only became popular when the internet began to be widely used in the mid-1990s. Along with the human need for easy and fast communication, the application that can be used is Voice Chat which allows users to carry out voice communication. But the voice chat application is less secure because it is easily intercepted by other parties. Eavesdroppers can easily find out the contents of conversations in instant messaging and the lack of privacy for chat users. The RC4 algorithm has a weakness in its use to encrypt a message. The downside is that Vigenere can only perform encryption and decryption processes for short messages. One way that can be used is to make security for the voice chat application using the Mid-Square Technique algorithm
References
[2] B. Schneier, Applied Cryptography, Oak Park, 1996.
[3] E. Setyaningsih, Kriptografi & Implementasi Menggunakan Matlab, Yogyakarta, 2015.
[4] R. Munir, Pengantar Kriptografi, Bandung, 2004.
[5] D. Ariyus, Pengantar Ilmu Kriptografi, Andi, 2008.
[6] E. Agustina and A. Kurniati, "Pemanfaatan Kriptografi Dalam Mewujudkan Keamanan Informasi Pada e-Voting di Indonesia," in Seminar Nasional Informatika, 2009.
[7] S. Prabowo, "Kriptografi," Jan 2018. [Online]. Available: http://www.sigitprabowo.id/2013/01/kriptografi-jenis-jenis-serangan-dalam.html.
[8] N. Aleisa, A Comparison of the 3DES and AES Encryptions Standards, 2015.
[9] J. Thakur and N. Khumar, DES,AES ad Blowfish: Symmetric Key Cryptography Algorithm Simulation Based Performance Analysis, 2011.
[10] Mohtashim, April 2015. [Online]. Available: https://tutorialspoint.com/cryptography/cryptography.htm.
[11] Uaies Hafizh, "Teknik Simulasi," 01 November 2011. [Online]. Available: https://uaieshafizh.wordpress.com/2011/11/01/metode-middle-square/.
[12] Wikipedia, "Wikipedia," 27 Maret 2020. [Online]. Available: https://id.wikipedia.org/wiki/Pesan_suara.
[13] F. W. Yudo Untoro, Algoritma Pemograman Dengan Bahasa Java, Yogyakarta, 2010.
[14] M. D. Irwanto, Perancangan Object Oriented Software dengan UML, Yogyakarta, 2007.
[15] M. Yazdi, Pemograman Matlab Pada Sistem Pakar Fuzzy, Yogyakarta, 2017.
[16] S. Al-Hinai, "Algebraic Attacks on Clock-Controlled Stream Chiphers," 2006.
[17] K. Maret 2019. [Online]. Available: https://kiajar.com/pengertian-teks-editorial/.
[18] Mohanmad, "d-HMAC-An improved HMAC algorithm," IJCSIS, vol. Vol.13, no. ISSN 1947-5500, p. No.4, April 2015
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Modifikasi Pembentukan Algoritma Rc4 Cipher Dengan Metode Acak Mid-Square Technique Untuk Pengamanan Voice Chat
Pages: 26-30
Copyright (c) 2022 Jurnal Sains dan Teknologi Informasi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).











