Analysis And Implementation of Noekeon Algorithms For Encryption and Description of Text Data

  • Noverta Efendi Electronic Engineering Vocational Education, Faculty of Teacher Training and Education, Universitas Muhammadiyah Riau
  • Fauzan Azim Electronic Engineering Vocational Education, Faculty of Teacher Training and Education, Universitas Muhammadiyah Riau
Keywords: Application Design, encryption-decryption text file encryption, Noekeon algorithm.

Abstract

As the times evolve, human needs increase. Including information needs. Therefore, sending and storing files through electronic media requires a process that can ensure the security and integrity of the file.  To ensure the safety and integrity of a  file, an encoding process is required. Encryption is performed when the file is sent. This process will convert the original file into a confidential unreadable file.  Meanwhile, the decryption process is done by the recipient of the sent file.   The personal file received will be converted back to the original file.  By encoding, the original file will not be read by unauthorized parties but only by recipients who have a decryption key.

References

[1] N. M. D. Oktafiansyah, F. Agus, and S. Maharani, “Penerapan Kriptografi Dengan Algoritma Data Encryption Standart Pada Text Hasil Konversi Dari Citra,” Semin. Nas. Ilmu Komput. dan Teknol. Inf., vol. 1, no. 1, pp. 85–89, 2016.
[2] Y. Wiharto and A. Irawan, “Enkripsi Data Menggunakan Advanced Encryption Standart 256,” Kilat, vol. 7, no. 2, pp. 91–99, 2018, doi: 10.33322/kilat.v7i2.352.
[3] S. Wardoyo and R. Fahrizal, “Aplikasi Teknik Enkripsi Dan Dekripsi File Dengan Algoritma Blowfish Pada Perangkat Mobile Berbasis Android,” Setrum Sist. Kendali-Tenaga-elektronika-telekomunikasi-komputer, vol. 3, no. 1, p. 43, 2016, doi: 10.36055/setrum.v3i1.497.
[4] A. Saputra and A. Widyanto, “Enkripsi Dan Dekripsi File Dengan Algoritma Blowfish,” J. Sist. Inf. Dan Teknol. Inf., vol. 4, no. 1, pp. 22–30, 2015.
[5] M. I. Assegaf, R. Destias, N. Sitaresmi, and Y. Wiharto, “Implementasi Enkripsi-Dekripsi dengan Algoritma RC2 Menggunakan Java,” J. Media Inform. Budidarma, vol. 4, pp. 898–903, 2020, doi: 10.30865/mib.v4i4.2256.
[6] E. L. Hakim, Khairil, and F. H. Utami, “Aplikasi Enkripsi Dan Deskripsi Data Menggunakan Algoritma Rc4 Dengan Menggunakan Bahasa Pemrograman Php,” J. Media Infotama, vol. 10, no. 1, pp. 1–7, 2014.
[7] D. Adhar, “Implementasi Algoritma Des (Data Encryption Standard) Pada Enkripsi Dan Deskripsi Sms Berbasis Android,” J. Tek. Inform. Kaputama, vol. 3, no. 2, pp. 53–60, 2019, [Online]. Available: https://jurnal.kaputama.ac.id/index.php/JTIK/article/view/185.
[8] A. H. Lubis, “ENKRIPSI DATA DENGAN ALGORITMA KRIPTROGRAFI NOEKEON,” CESS(JournalOfComputerEngineering,System AndScience), vol. 2, no. 1, pp. 97–101, 2017.
[9] C. Kurniawan, “Algoritma Kriptografi Noekon,” [Online]. Available: http://ilmusisteminfo.com/upload/file_pdf/Kriptografi dan Algoritma 1567687693.pdf.
[10] I. Utomo, W. Mulyono, W. S. Sari, D. R. Ignatius, M. Setiadi, and C. A. Sari, “M ODIFIKASI E NKRIPSI G AMBAR M ENGGUNAKAN 64- BIT K UNCI P ADA A LGORITMA D ATA E NCRYPTION S TANDARD ( DES ),” Din. Rekayasa, vol. 12, no. 2, 2018.
Published
2021-03-30
How to Cite
Efendi, N., & Fauzan Azim. (2021). Analysis And Implementation of Noekeon Algorithms For Encryption and Description of Text Data. Jurnal Info Sains : Informatika Dan Sains, 11(1), 11-17. Retrieved from http://seaninstitute.org/infor/index.php/JIS/article/view/110