PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY

The rapid development of the Internet today to easily exchange data. This leads to high levels of risk in the data piracy. One of the ways to secure data is using cryptography camellia. Camellia is known as a method that has the encryption and decryption time is fast. Camellia method has three k...

Full description

Bibliographic Details
Main Authors: Lanny Sutanto, Gregorius Satia Budhi, Leo Willyanto Santoso
Format: Article
Language:English
Published: Petra Christian University 2014-01-01
Series:Jurnal Informatika
Subjects:
Online Access:http://puslit2.petra.ac.id/ejournal/index.php/inf/article/view/19147
id doaj-e73cec4ed7d141dd8e25097c1ec03c71
record_format Article
spelling doaj-e73cec4ed7d141dd8e25097c1ec03c712020-11-24T23:05:14ZengPetra Christian UniversityJurnal Informatika1411-01051411-01052014-01-01122109116PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEYLanny Sutanto0Gregorius Satia Budhi1Leo Willyanto Santoso2 Program Studi Teknik Informatika Fakultas Teknologi Industri Universitas Kristen Petra <br />Jl. Siwalankerto 121–131 Surabaya 60236 Program Studi Teknik Informatika Fakultas Teknologi Industri Universitas Kristen Petra <br />Jl. Siwalankerto 121–131 Surabaya 60236 Program Studi Teknik Informatika Fakultas Teknologi Industri Universitas Kristen Petra <br />Jl. Siwalankerto 121–131 Surabaya 60236 The rapid development of the Internet today to easily exchange data. This leads to high levels of risk in the data piracy. One of the ways to secure data is using cryptography camellia. Camellia is known as a method that has the encryption and decryption time is fast. Camellia method has three kinds of scale key is 128 bit, 192 bit, and 256 bit.This application is created using the C++ programming language and using visual studio 2010 GUI. This research compare the smallest and largest key size used on the file extension .Txt, .Doc, .Docx, .Jpg, .Mp4, .Mkv and .Flv. This application is made to comparing time and level of security in the use of 128-bit key and 256 bits. The comparison is done by comparing the results of the security value of avalanche effect 128 bit key and 256 bit key. http://puslit2.petra.ac.id/ejournal/index.php/inf/article/view/19147Cryptographycamelliaavalanche effect.
collection DOAJ
language English
format Article
sources DOAJ
author Lanny Sutanto
Gregorius Satia Budhi
Leo Willyanto Santoso
spellingShingle Lanny Sutanto
Gregorius Satia Budhi
Leo Willyanto Santoso
PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY
Jurnal Informatika
Cryptography
camellia
avalanche effect.
author_facet Lanny Sutanto
Gregorius Satia Budhi
Leo Willyanto Santoso
author_sort Lanny Sutanto
title PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY
title_short PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY
title_full PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY
title_fullStr PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY
title_full_unstemmed PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY
title_sort perbandingan aplikasi menggunakan metode camellia 128 bit key dan 256 bit key
publisher Petra Christian University
series Jurnal Informatika
issn 1411-0105
1411-0105
publishDate 2014-01-01
description The rapid development of the Internet today to easily exchange data. This leads to high levels of risk in the data piracy. One of the ways to secure data is using cryptography camellia. Camellia is known as a method that has the encryption and decryption time is fast. Camellia method has three kinds of scale key is 128 bit, 192 bit, and 256 bit.This application is created using the C++ programming language and using visual studio 2010 GUI. This research compare the smallest and largest key size used on the file extension .Txt, .Doc, .Docx, .Jpg, .Mp4, .Mkv and .Flv. This application is made to comparing time and level of security in the use of 128-bit key and 256 bits. The comparison is done by comparing the results of the security value of avalanche effect 128 bit key and 256 bit key.
topic Cryptography
camellia
avalanche effect.
url http://puslit2.petra.ac.id/ejournal/index.php/inf/article/view/19147
work_keys_str_mv AT lannysutanto perbandinganaplikasimenggunakanmetodecamellia128bitkeydan256bitkey
AT gregoriussatiabudhi perbandinganaplikasimenggunakanmetodecamellia128bitkeydan256bitkey
AT leowillyantosantoso perbandinganaplikasimenggunakanmetodecamellia128bitkeydan256bitkey
_version_ 1725626753365311488