• Login
    View Item 
    •   USU-IR Home
    • Faculty of Computer Science and Information Technology
    • Department of Information Technology
    • Master Theses
    • View Item
    •   USU-IR Home
    • Faculty of Computer Science and Information Technology
    • Department of Information Technology
    • Master Theses
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Three Pass Protocol untuk Keamanan Kunci Menggunakan Algoritma Affine Cipher dan Kombinasi Exclusive-Or (XOR)

    View/Open
    Fulltext (1.174Mb)
    Date
    2023
    Author
    Harahap, Muhammad Ikhwan
    Advisor(s)
    Suherman
    Sembiring, Rahmat Widia
    Metadata
    Show full item record
    Abstract
    Information is a very important concern in the current technological era, especially in terms of security through the exchange of information that is so fast that it makes it easy for people to get various kinds of information by recording or openly disseminating data. This requires message security measures to prevent unwanted access to interference that wants to take or destroy data or messages used by users. Implementing the Affine Cipher algorithm and the Exclusive-OR (XOR) combination in the Three Pass Protocol as a key security technique. Messages are sent through better security techniques without having to distribute encryption keys. Process and decryption key as a measure of hiding the original text message. An asymmetric algorithm through which the public key used in the Plaintext encryption process can be sent, so that the original Plaintext is not easily known. While the private key is used in the decryption process, the plaintext that has been encrypted can be identified. The process of encryption and decryption of the Affine Cipher algorithm is carried out by dividing the Plaintext into 4 alphabets 2 Sections and message reversal. Whereas XOR for the encryption and decryption process is just Plaintext. The two algorithms used can improve Plaintext security better because the Plaintext encryption and decryption process is done twice through the Cryptographic Algorithm. Development with different cryptographic algorithm methods so that the security of text messages is further enhanced from attacks by other parties. Implementation of a combination of message cryptographic programs can be carried out using a security-based system (User Service) that can secure messages or data.
    URI
    https://repositori.usu.ac.id/handle/123456789/81832
    Collections
    • Master Theses [621]

    Repositori Institusi Universitas Sumatera Utara (RI-USU)
    Universitas Sumatera Utara | Perpustakaan | Resource Guide | Katalog Perpustakaan
    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of USU-IRCommunities & CollectionsBy Issue DateTitlesAuthorsAdvisorsKeywordsTypesBy Submit DateThis CollectionBy Issue DateTitlesAuthorsAdvisorsKeywordsTypesBy Submit Date

    My Account

    LoginRegister

    Repositori Institusi Universitas Sumatera Utara (RI-USU)
    Universitas Sumatera Utara | Perpustakaan | Resource Guide | Katalog Perpustakaan
    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV