IMPLEMENTASI KEAMANAN FILE DENGAN KOMPRESI HUFFMAN DAN KRIPTOGRFI ADVANCED ENCRYPTION STANDART (AES) PADA PENGAMANAN FILE DATA ANTEMORTEM
Data can be defined as having an important role for every element that is always related to information technology. Very large bandwidth and resources are needed in transferring data or files over the network or other delivery media, which in this case is certainly needed if the data or files being...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2021-07-19.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Data can be defined as having an important role for every element that is always related to information technology. Very large bandwidth and resources are needed in transferring data or files over the network or other delivery media, which in this case is certainly needed if the data or files being transferred have a large capacity coverage and a long time and require large storage space inside. the process is similar to that of an antemortem data file. The antemortem data file that is sent must be facilitated with security so that the file sent is not misused by those who do not have the authority and responsibility, so a way is needed to overcome this problem. The compression technique is one of the techniques created to reduce the size of the capacity of a file and the cryptographic technique itself is a technique that can be used for file encoding in order to secure a file and not fall into the hands of irresponsible people. Experiments on cryptography and compression were carried out in three stages where the experiments were experiments on security, alteration and integrity of antemortem files. The results of this study indicate that the antemortem data file does not change due to the locking process, this is shown by the checksum experiment for text-based files and RGB histograms for image-based files. In the aspect of security and integrity, a good level of security and integrity of the files that have been locked has been obtained, where this result is strengthened by sniffing experiments on existing data. |
---|---|
Item Description: | http://repository.upnvj.ac.id/11118/1/ABSTRAK.pdf http://repository.upnvj.ac.id/11118/3/AWAL.pdf http://repository.upnvj.ac.id/11118/4/BAB%201.pdf http://repository.upnvj.ac.id/11118/5/BAB%202.pdf http://repository.upnvj.ac.id/11118/6/BAB%203.pdf http://repository.upnvj.ac.id/11118/7/BAB%204.pdf http://repository.upnvj.ac.id/11118/8/BAB%205.pdf http://repository.upnvj.ac.id/11118/9/DAFTAR%20PUSTAKA.pdf http://repository.upnvj.ac.id/11118/11/RIWAYAT%20HIDUP.pdf http://repository.upnvj.ac.id/11118/23/LAMPIRAN.pdf http://repository.upnvj.ac.id/11118/2/ARTIKEL%20KI.pdf |