ALGORITMA MD5 DAN RC5 UNTUK PENGAMANAN FILE PDF

  • Manuel Luis Belo(1)
    Universitas Nusa Cendana
  • Derwin Rony Sina(2*)
    Universitas Nusa Cendana
  • Yelly Yosiana Nabuasa(3)
    Universitas Nusa Cendana
  • (*) Corresponding Author
Keywords: Cryptography, message digest 5, Revest code 5, PDF

Abstract

Electronic documents are digital file types used to store the important data or information of a person or an institution. There are some of the most widely used document file formats that are. docx,. xlsx,. pptx, and. pdf. Issues that arise when a company, institution or organization that has confidential documents and important data in the form of document files can be accessed by persons or parties who have no authority. A document security solution can use cryptographic onsep. The document file types that can be encrypted are restricted to the Portable Document Format (. pdf) file. In this research is done lock security user input using the algorithm Message Digest 5 (MD5) and binary value multiplier in PDF files using Rivest Code algorithm (RC5). The test results using (i) the same key on a different PDF file indicate that the resulting binary chiperfile is different from the derived binary Plainfile, (ii) the key length of 1 to 8 characters on the same PDF file indicates that binary The chiperfile generated each key length differs from the binary plainfile taken, (iii) a change of 1 character at the beginning, in the middle, and at the end of the input key indicates that the method used is sensitive to the character changes on the key Input. It is known from the level of similarity of binary chiperfile and small/low binary plainfile based on the value of the collation generated per test is (i) 0.205795252, (ii) 0.24692765, (iii) 0.22421886.

Downloads

Download data is not yet available.

References

Alyas, R. 2014. “Hybrid Cryptosystem Untuk Pengamanan E-Dokumen Menggunakan Algoritma RC4, RSA Dan MD5”.

Fanggidae A, Polly Y. T. 2015. “Analisis Pembangkit Kunci Dengan Tent Map, Session Key Dan Linear Congruential Generator Pada Cipher Aliran

Munir, R. 2006, Kriptografi, Informatika, Bandung.

Munir, R. 2012, Analisis Keamanan Algoritma Enkripsi Citra Digital menggunakan Kombinasi Dua Chaos Map dan Penerapan Teknik Selektif, Bandung, http://informatika.stei.itb.ac.id/~rinaldi.munir/Penelitian/Makalah_JUTI_ITS_2012.pdf diakses tanggal 20 Maret 2019.

Rivest, R.L. 1997. The RC5 Encryption Algorithm*. Cambridge : MIT Laboratory for Computer Science 545 Technology Square

Sugiono, 2007, Metode Penelitian Administrasi, Alfabeta, Bandung.-

PlumX Metrics

Published
2020-03-31
How to Cite
[1]
M. Belo, D. Sina, and Y. Nabuasa, “ALGORITMA MD5 DAN RC5 UNTUK PENGAMANAN FILE PDF”, jicon, vol. 8, no. 1, pp. 68-75, Mar. 2020.
Section
Articles

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.