IMPLEMENTASI FEISTEL BLOCK CIPHER DALAM ENKRIPSI FILE BERBENTUK TEKS
Universitas Gunadarma
Indonesia
Universitas Gunadarma
Indonesia
Universitas Gunadarma
Indonesia
Abstract
Keywords
References
L. Y. Zhang, Y. Liu, F. Pareschi, Y. Zhang, K. W. Wong, R. Rovatti, and G. Setti, “On the security of a class of diffusion mechanisms for image encryption,” IEEE Transactions on Cybernetics, vol. 48, no. 4, pp. 1-13, 2017
X. Zhang, Y. Niu, C. Shen, and G. Cui, “Fluorescence resonance energy transfer-based photonic circuits using single-stranded tile self-assembly and DNA strand displacement,” Journal of Nanoscience and Nanotechnology, vol. 17, no. 2, pp. 1053–1060, 2017
J. P. L. Cox, “Long-term data storage in DNA,” Trends in Biotechnology, vol. 19, no. 7, pp. 247-250, 2001
X. Zhang, Y. Wang, G. Cui, Y. Niu, and J. Xu, “Application of a novel IWO to the design of encoding sequences for DNA computing,” Computers and Mathematics with audioApplications, vol. 57, no. 11-12, pp. 2001–2008, 2009
Y. Erlich, and D. Zielinski, “DNA fountain enables a robust and efficient storage architecture,” Science, vol. 355, no. 6328, pp. 950-954, 2016
Sai Praveen Venigalla, M. Nagesh Babu, Srinivas Boddu, G. Santhi Swaroop Vemana, “Implementation Of The Triple-Desblock Cipher Using Vhdl”, . International Journal Of Advances In Engineering & Technology (IJAET), India. ISSN: 22311963117. Vol. 3, Issue 1, Pp. 117-128, 2012
Mandeep Singh Narula dan Simarpreet Singh, “Implementation Of Triple Data Encryption Standard Using Verilog”, International Journal Of Advanced Research In Computer Science And Software Engineering (IJARCSSE), Page 667 Volume 4 , Issue 1. ISSN: 2277 128X, 2014.
Hidayat, Akik, “Enkripsi dan Dekripsi Data dengan Algoritma 3DES”, Bandung: Universitas Padjadjaran, 2008.
Rahim, Muhammad Abdul, “Implementasi Kombinasi Algoritma 3DES dan Algoritma Base64 pada Sistem Keamanan Handshaking Animation Store di CV”. Edukreasi, Semarang: Universitas Dian Nuswantoro, 2013
Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir, dan Y.Al-Nabhani. “New Comparative Study Between DES, 3DES, and AES within Nine Factors”, Journal Of Computing. Page 152 Volume 2, Issue 3. ISSN: 2151-9617, 2010
William Stallings, “Cryptography and Network Security”, Principles and Practice, Third Edition, Pearson, 2003.
Feistel H, “Cryptography and Computer Privacy”, Scientific American, Vol. 228, No.5, pp. 15-23, 1973.
V.U.K. Sastry and K. Anup Kumar, “A Modified Feistel Cipher involving a key as a multiplicant on both the sides of the Plaintext matrix and supplemented with Mixing, Permutation and XOR Operation”, International Journal of Computer Technology and Applications, ISSN 2229-6093,Vol 3 (1), pp, 23-31 , 2012.
V.U.K. Sastry and K. Anup Kumar, “A Modified Feistel Cipher involving a key as a multiplicant on both the sides of the Plaintext matrix and supplemented with Mixing, Permutation and Modular Arithmetic Addition”, International Journal of Computer Technology and Applications, ISSN 2229-6093,Vol 3 (1), pp, 32-39 , 2012.
V.U.K. Sastry and K. Anup Kumar, “A Modified Feistel Cipher Involving a Key as a Multiplicant on Both the Sides of the Plaintext Matrix and Supplemented with Mixing, Permutation, and Modular Arithmetic Addition”, International Journal of Computer Science and Information Technologies , ISSN 0975 – 9646. Vol. 3 (1) , 2012, pp, 3133 – 3141,2012.