z-logo
open-access-imgOpen Access
Implementasi Algoritma Rot Dan Subtitusional Block Cipher Dalam Mengamankan Data
Author(s) -
Ayu Pratiwi
Publication year - 2017
Publication title -
means (media informasi analisa dan sistem)
Language(s) - English
Resource type - Journals
eISSN - 2599-3089
pISSN - 2548-6985
DOI - 10.54367/means.v2i1.27
Subject(s) - confidentiality , block cipher , computer science , encryption , block (permutation group theory) , cbc mac , transposition cipher , cipher , process (computing) , computer security , arithmetic , running key cipher , programming language , mathematics , geometry
The security and confidentiality of data is one of the most important aspects in the information system at this time. Caused by the rapid development of science and technology that allows the emergence of new techniques, which are misused by certain parties that threaten the security of information systems. In general, the data are categorized into two, namely confidential data and data that is not confidential. Data that is not confidential is usually not too much attention. What really needs to be considered is confidential data, where every information contained in it will be very valuable for those who need it because the data can be easily duplicated. The ROT-n algorithm is one simple encryption algorithm that uses alphabetical shifts as much as n to convert plain text into cipher text, whereas Block ciphers work by processing data in blocks, where several characters / data are combined into one block. Each one block process produces one block output as well.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here