Penerapan Algoritma Blok Cipher Oe-Ck (Odd-Even Confusing Key) Pada Aplikasi Pengamanan Gambar
Keywords:
Ganjil-genap Tombol Membingungkan, citra, Kanan, KiriAbstract
In cryptography, encryption and decryption, encryption is the process of securing the original image data into an incomprehensible image, while decryption is the process of returning encrypted image data so that it is easy to read. In the process of encryption and decryption there is a key which functions as a bridge between encryption and decryption in supporting the strength of image security. Based on these problems the author will make a process of securing images in the form of images that can be carried out in encrypting images into certain algorithm forms. This is possible considering that an image can be represented in a table containing binary numbers. In this study the OE-CK block cipher algorithm will be implemented to encode images in jpeg format, which has a size of 1000x1200 pixels. The key used to encode the image uses the key "Lasma Hutagaol".
References
Rifki Sadikin, Kriptografi untuk keamanan jaringan, Th. Arie Prabawati, Ed. Yogtakarta, 2012.
Jurnal Informatika Mulawarman and Indah Fitri AStuti Awang Harsa Kridalaksana Fresly Nandar Pabokory, "Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen Menggunakan Algoritma Advanced Encryption Standard," Jurnal Informatika Mulawarman, vol. 10, p. 21, 1 Februari 2015.
Kamus Besar Bahasa Indonesia Daring. Online. [Online]. https://kbbi.kemdikbud.go.id/entri/penerapan
Indah Fitri Astuti Awang Harsa Kridalaksana Fresly Nandar Prabokory, "Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File, Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard ," Jural Informatika Mulawarman, vol. 10, p. 21, 1 Februari 2015.
M.Kom Emy Setyaningsih S.Si., Kriptografi & Implementasinya Menggunakan MATLAB, Nikodemus WK, Ed. Yogyakarta, Indonesia: Andi Ed, 2015.
Rinaldi Munir, Kriptografi. Bandung, Indonesia: Informatika Bandung, Oktober 2006.
Aditio Pangestu Ali Akbar, "Sekolah Teknik Elektro Dan Informatika Institut Teknologi Bandung," Algoritma Blok Cipher OE-CK, 2018.
Andi Juansyah, "Pembangunan Aplikasi Child Tracker Berbasis Assisted-Global Positioning System (A-GPS) Dengan Platform Android," Jurnal Ilmiah Komputer Dan Informatika, vol. 1, p. 2, 1 Agustus 2015.
Rosa A.S-M.Shalahuddin, Modul Pembelajaran Rekayasa Perangkat Lunak (Terstruktur dan Berorientasi Objek). Bandung, Indonesia, 2011.
S.T.,M.Eng.Sc.,Ph.D. Marwan, Belajar Mudah MATLAB Beserta Aplikasinya, Yeskha M.M., Ed. Yogyakarta Andi, Indonesia, 2017.A. Karim, S. Esabella, T. Andriani, and M. Hidayatullah, “Penerapan Metode Multi-Objective Optimization on the Basis of Simple Ratio Analysis ( MOOSRA ) dalam Penentuan Lulusan Mahasiswa Terbaik,” vol. 4, no. 1, pp. 162–168, 2022, doi: 10.47065/bits.v4i1.1630.
N. Oktari, D. P. Utomo, S. Aripin, and A. Karim, “Penerapan Metode Operational Competitiveness Rating Analysis ( OCRA ) Dalam Penerimaan Karyawan Perjanjian Kerja Waktu Tertentu ( PKWT ),” vol. 3, no. 3, pp. 218–226, 2022, doi: 10.47065/josh.v3i3.1471.
A. Karim, S. Esabella, M. Hidayatullah, and T. Andriani, “Sistem Pendukung Keputusan Aplikasi Bantu Pembelajaran Matematika Menggunakan Metode EDAS,” vol. 4, no. 3, 2022, doi: 10.47065/bits.v4i3.2494.
M. Bobbi, K. Nasution, S. Suryadi, and A. Karim, “Sistem Pendukung Keputusan Dalam Rekomendasi Kelayakan nasabah Penerima Kredit Menerapkan Metode MOORA dan MOOSRA,” vol. 4, no. 3, pp. 1284–1292, 2022, doi: 10.47065/bits.v4i3.2610.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).








