IMPLEMENTASI FEISTEL BLOCK CIPHER DALAM ENKRIPSI FILE BERBENTUK TEKS
Universitas Gunadarma
Indonesia
Universitas Gunadarma
Indonesia
Universitas Gunadarma
Indonesia
Article Submitted: 11 July 2021
Article Published: 10 August 2021
Abstract
Keywords
References
L. Y. Zhang, Y. Liu, F. Pareschi, Y. Zhang, K. W. Wong, R. Rovatti, and G. Setti, “On the security of a class of diffusion mechanisms for image encryption,” IEEE Transactions on Cybernetics, vol. 48, no. 4, pp. 1-13, 2017
X. Zhang, Y. Niu, C. Shen, and G. Cui, “Fluorescence resonance energy transfer-based photonic circuits using single-stranded tile self-assembly and DNA strand displacement,” Journal of Nanoscience and Nanotechnology, vol. 17, no. 2, pp. 1053–1060, 2017
J. P. L. Cox, “Long-term data storage in DNA,” Trends in Biotechnology, vol. 19, no. 7, pp. 247-250, 2001
X. Zhang, Y. Wang, G. Cui, Y. Niu, and J. Xu, “Application of a novel IWO to the design of encoding sequences for DNA computing,” Computers and Mathematics with audioApplications, vol. 57, no. 11-12, pp. 2001–2008, 2009
Y. Erlich, and D. Zielinski, “DNA fountain enables a robust and efficient storage architecture,” Science, vol. 355, no. 6328, pp. 950-954, 2016
Sai Praveen Venigalla, M. Nagesh Babu, Srinivas Boddu, G. Santhi Swaroop Vemana, “Implementation Of The Triple-Desblock Cipher Using Vhdl”, . International Journal Of Advances In Engineering & Technology (IJAET), India. ISSN: 22311963117. Vol. 3, Issue 1, Pp. 117-128, 2012
Mandeep Singh Narula dan Simarpreet Singh, “Implementation Of Triple Data Encryption Standard Using Verilog”, International Journal Of Advanced Research In Computer Science And Software Engineering (IJARCSSE), Page 667 Volume 4 , Issue 1. ISSN: 2277 128X, 2014.
Hidayat, Akik, “Enkripsi dan Dekripsi Data dengan Algoritma 3DES”, Bandung: Universitas Padjadjaran, 2008.
Rahim, Muhammad Abdul, “Implementasi Kombinasi Algoritma 3DES dan Algoritma Base64 pada Sistem Keamanan Handshaking Animation Store di CV”. Edukreasi, Semarang: Universitas Dian Nuswantoro, 2013
Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir, dan Y.Al-Nabhani. “New Comparative Study Between DES, 3DES, and AES within Nine Factors”, Journal Of Computing. Page 152 Volume 2, Issue 3. ISSN: 2151-9617, 2010
William Stallings, “Cryptography and Network Security”, Principles and Practice, Third Edition, Pearson, 2003.
Feistel H, “Cryptography and Computer Privacy”, Scientific American, Vol. 228, No.5, pp. 15-23, 1973.
V.U.K. Sastry and K. Anup Kumar, “A Modified Feistel Cipher involving a key as a multiplicant on both the sides of the Plaintext matrix and supplemented with Mixing, Permutation and XOR Operation”, International Journal of Computer Technology and Applications, ISSN 2229-6093,Vol 3 (1), pp, 23-31 , 2012.
V.U.K. Sastry and K. Anup Kumar, “A Modified Feistel Cipher involving a key as a multiplicant on both the sides of the Plaintext matrix and supplemented with Mixing, Permutation and Modular Arithmetic Addition”, International Journal of Computer Technology and Applications, ISSN 2229-6093,Vol 3 (1), pp, 32-39 , 2012.
V.U.K. Sastry and K. Anup Kumar, “A Modified Feistel Cipher Involving a Key as a Multiplicant on Both the Sides of the Plaintext Matrix and Supplemented with Mixing, Permutation, and Modular Arithmetic Addition”, International Journal of Computer Science and Information Technologies , ISSN 0975 – 9646. Vol. 3 (1) , 2012, pp, 3133 – 3141,2012.