Abstract—Security of data in a computer is needed to protect critical data and information from other parties. One way to protect data is to apply the science of cryptography to perform data encryption. There are wide variety of algorithms used for encryption of data, this study used a one-time pad algorithm for encrypting data. Algorithm One Time Pad uses the same key in the encryption process and a decryption of the data. An encrypted data will be transformed into cipher text so that the only person who has the key can open that data. Therefore, analysis will be done for an application that implements a onetime pad algorithm for encrypting data. The application that implements the
An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm
Plagiarsm Checker
Peer Review
An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm
[1] S. P. Agustanti, “Pengamanan Kunci Enkripsi One-Time Pad (Otp) Menggunakan Enkripsi Rsa”, Vol. 7, No. 1, pp. 95-100, 2010. [2] I. R. Widiasari, “Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security”, Vol. 57, No. 20, pp. 1-8, 2012. [3] M. A. Muda, M, Komarudin and Y. Susanty, “Rancang Bangun Sistem Enkripsi Sebagai Security Komunikasi Handie-Talkie Menggunakan Mikrokontroler Avr Seri”, Vol. 1, No. 1, pp. 25-37, 2007. [4] R. Primartha, “Penerapan Enkripsi Dan Dekripsi File Menggunakan Algoritma Data Encryption Standard (DES)”, Vol. 3, No. 2, 2011. [5] Y. Kurniawan, A. S. Ahmad, M. S. Mardiyanto, I. Supriana dan S. Sutikno, “Analisis Sandi Diferensial terhadap AES, DES dan AE1”, Vol. 38 A, No. 1, pp. 73-88. 2006. [6] E. Sitohang, “Perangkat Aplikasi Keamanan Data Text Menggunakan Electronic Codebook dengan Algoritma DES”, Vol. 5, No. 3, 2013. [7] M. Sholeh dan J. V. Hamokwarong, “Aplikasi Kriptografi dengan Metode Vernam Cipher dan Metode Permutasi Biner”, Vol. 7, No. 2, pp. 8-13, 2011. [8] D. Wirdasari, “Prinsip Kerja Kriptografi Dalam Mengamankan Informasi”, Vol. 5, No. 2, 2008. [9] M. Fairuzabadi, “Implementasi Kriptografi Klasik Menggunakan Borland Delphi”, Vol. 4, No. 2, pp. 65-78, 2010. [10] Inayatullah, “Analisis Penerapan Algoritma MD 5 Untuk Pengamanan Password”, Vol. 3, No. 3, 2007. [11] F. W. Nurwiyati dan I. Yatini B., “Enkripsi Dekripsi Data Menggunakan Metode Stream dan Vigenere Cipher”, Vol. 3, No. 23, 2013. [12] R. Munir, “Algoritma Enkripsi Citra dengan Pseudo One-Time Pad yang Menggunakan Sistem Chaos”, 2011.