PENERAPAN ALGORITMA KRIPTOGRAFI AES (ADVANCED ENCRYPTION STANDARD) DAN ALGORITMA KOMPRESI RLE (RUN LENGTH ENCODING) UNTUK PENGAMANAN FILE DOKUMEN

Document files are sensitive data where there is often theft and misuse to change the contents of the file. In storage by an individual or a particular organization, the file is stored in a computer or database system. The rise of data theft in the form of important document files that occur in larg...

Full description

Saved in:
Bibliographic Details
Main Author: Rifky Priambudi, (Author)
Format: Book
Published: 2021-07-12.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_11126
042 |a dc 
100 1 0 |a Rifky Priambudi, .  |e author 
245 0 0 |a PENERAPAN ALGORITMA KRIPTOGRAFI AES (ADVANCED ENCRYPTION STANDARD) DAN ALGORITMA KOMPRESI RLE (RUN LENGTH ENCODING) UNTUK PENGAMANAN FILE DOKUMEN 
260 |c 2021-07-12. 
500 |a http://repository.upnvj.ac.id/11126/1/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/11126/2/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/11126/3/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/11126/4/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/11126/5/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/11126/6/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/11126/7/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/11126/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/11126/9/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/11126/23/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/11126/11/ARTIKEL%20KI.pdf 
520 |a Document files are sensitive data where there is often theft and misuse to change the contents of the file. In storage by an individual or a particular organization, the file is stored in a computer or database system. The rise of data theft in the form of important document files that occur in large companies or individuals is certainly a clear violation of applicable laws. So that these irresponsible parties benefit from data theft. This study aims to develop or secure digital images, namely document files with more efficient results by using a combination of the AES algorithm in the encryption process and the RLE algorithm in the compression process. The AES algorithm is used as the encryption and decryption process for the file, while the RLE algorithm is used as the compression and decompression process. From the results of this study, the combination of the AES algorithm and the RLE algorithm succeeded in securing document files in a more efficient way and results. Where in the process of compressing and decompressing document files that have quite a lot of characters in them can be completed quickly in the encryption and compression process and vice versa when decompressing and decrypting the resulting file is also relatively the same and stable as the original file before being processed. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a Q Science (General) 
690 |a QA Mathematics 
690 |a QA75 Electronic computers. Computer science 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/11126/ 
787 0 |n http://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/11126/  |z Link Metadata