ALGORITMA MD5 DAN RC5 UNTUK PENGAMANAN FILE PDF

Main Article Content

Manuel Luis Belo
Derwin Rony Sina
Yelly Yosiana Nabuasa

Abstract

Electronic documents are digital file types used to store the important data or information of a person or an institution. There are some of the most widely used document file formats that are. docx,. xlsx,. pptx, and. pdf. Issues that arise when a company, institution or organization that has confidential documents and important data in the form of document files can be accessed by persons or parties who have no authority. A document security solution can use cryptographic onsep. The document file types that can be encrypted are restricted to the Portable Document Format (. pdf) file. In this research is done lock security user input using the algorithm Message Digest 5 (MD5) and binary value multiplier in PDF files using Rivest Code algorithm (RC5). The test results using (i) the same key on a different PDF file indicate that the resulting binary chiperfile is different from the derived binary Plainfile, (ii) the key length of 1 to 8 characters on the same PDF file indicates that binary The chiperfile generated each key length differs from the binary plainfile taken, (iii) a change of 1 character at the beginning, in the middle, and at the end of the input key indicates that the method used is sensitive to the character changes on the key Input. It is known from the level of similarity of binary chiperfile and small/low binary plainfile based on the value of the collation generated per test is (i) 0.205795252, (ii) 0.24692765, (iii) 0.22421886.

Downloads

Download data is not yet available.

Article Details

How to Cite
Belo, M., Sina, D., & Nabuasa, Y. (2020). ALGORITMA MD5 DAN RC5 UNTUK PENGAMANAN FILE PDF. Jurnal Komputer Dan Informatika, 8(1), 68-75. https://doi.org/10.35508/jicon.v8i1.2396
Section
Articles

References

[1] Alyas, R. 2014. “Hybrid Cryptosystem Untuk Pengamanan E-Dokumen Menggunakan Algoritma RC4, RSA Dan MD5”.
[2] Fanggidae A, Polly Y. T. 2015. “Analisis Pembangkit Kunci Dengan Tent Map, Session Key Dan Linear Congruential Generator Pada Cipher Aliran
[3] Munir, R. 2006, Kriptografi, Informatika, Bandung.
[4] Munir, R. 2012, Analisis Keamanan Algoritma Enkripsi Citra Digital menggunakan Kombinasi Dua Chaos Map dan Penerapan Teknik Selektif, Bandung, http://informatika.stei.itb.ac.id/~rinaldi.munir/Penelitian/Makalah_JUTI_ITS_2012.pdf diakses tanggal 20 Maret 2019.
[5] Rivest, R.L. 1997. The RC5 Encryption Algorithm*. Cambridge : MIT Laboratory for Computer Science 545 Technology Square
[6] Sugiono, 2007, Metode Penelitian Administrasi, Alfabeta, Bandung.-

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.