Implementasi Algoritma Skipjack Dalam Pengamanan File Video
Abstract
The problem that lies within the scope of the video is where the privacy video can be watched by unauthorized people if the video file is unsecured. In the event of a burglary and theft of important data information in a video file, it will be detrimental to interested parties. Therefore, we need an application system to be able to secure the video file. To minimize this, a second level of security is needed by scrambling the video so that the visual information from the video cannot be seen by people who do not have a key. Then the information in the video file is changed in the form of codes or signals where this code will be manipulated. Thus the authors feel the video files need to be secured with good security. So it is necessary to make encryption and decryption on video files. The skipjack algorithm is one of the cryptographic algorithms that can be used to secure video files. The skipjack algorithm is a 64-bit codebook electronic algorithm that changes a 64-bit input block to a 64-bit output block. The parameters used for encryption are 80-bit keys, and have 32 rounds for the encryption and description process. This study describes how to secure video files based on the skipjack algorithm.
Downloads
References
Suprianto,”Sistem Pengkodean Data Pada File Teks Pada Keamanan Informasi Dengan Menggunakan Metode Skipjack”, J.Comput.Bisnis, vol. 1, no.2, pp. 105-118, 2007.
H. Mukhtar, Kriptografi Untuk Keamanan Data. Yogyakarta: Deepublish, 2008.
R. Sadikin, Kriptografi Untuk Keamanan Jaringan. Yogyakarta: C.V OFFSET, 2012
Yusuf Kurniawan, Kriptografi Keamanan Internet dan Jaringan Komunikasi. Bandung: Informatika Bandung, 2004.
A.Dony, Pengantar Ilmu Kriptografi: Teori Analisis & Implementasi. Yogyakarta: C.V OFFSET, 2008.
S.S.M.K.Emy Setyaningsih, Kriftografi dan Implementasinya Menggunakan Matlab. Yogyakarta: CV. ANDI OFFSET, 2015
Mustafa Almahdi,Ali Ahmad Milad, Hjh Zaiton Muda, Zul Azri Bin Muhamad Noh, “Comparative Study of Performance in Cryptography Algorithms (Blowfish and Skipjack),” J.Comput.Sci., 2012.
Nurainun Sinaga, Syarifah Aini, Bezatulo Gulo,” Penerapan Algoritma Skipjack Untuk Menyandikan Short Message Service”,2018.
Wandani, Kiki Dwi, Sinurat, Sinar,” Implementasi Secure Hash Algoritma untuk Pengamanan pada File Video”, Inf. Dan Teknol.Ilm., vol. 13, pp.165-168,2018.
Rosa A.S dan M. Shalahuddin, Rekayasa Perangkat Lunak. Bandung: Informatika Bandung
M. primananda Arif Aditya, S.Si, “Dasar-Dasar Pemograman Database Dekstop dengan Visual Basic.Net 2008,” in Dasar-Dasar Pemograman Database Dekstop dengan Visual Basic.Net 2008, Jakarta: PT Elex Media Komputindo, 2013, pp. 2–10.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma Skipjack Dalam Pengamanan File Video
Pages: 430-437
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).