ENKRIPSI DAN DEKRIPSI SUARA MENGGUNAKAN METODE AES 128 BIT DENGAN SECRET KEY
Sending or exchanging data is something that often happens in the world of information technology. One of the data that is usually exchanged is voice. Voice is usually used to communicate. The data sent sometimes often contains data that is important and even very confidential and must be kept safe....
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2021-07-23.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repoupnvj_11187 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Angelika, . |e author |
245 | 0 | 0 | |a ENKRIPSI DAN DEKRIPSI SUARA MENGGUNAKAN METODE AES 128 BIT DENGAN SECRET KEY |
260 | |c 2021-07-23. | ||
500 | |a http://repository.upnvj.ac.id/11187/1/ABSTRAK.pdf | ||
500 | |a http://repository.upnvj.ac.id/11187/3/AWAL.pdf | ||
500 | |a http://repository.upnvj.ac.id/11187/24/BAB%20I.pdf | ||
500 | |a http://repository.upnvj.ac.id/11187/25/BAB%20II.pdf | ||
500 | |a http://repository.upnvj.ac.id/11187/26/BAB%20III.pdf | ||
500 | |a http://repository.upnvj.ac.id/11187/27/BAB%20IV.pdf | ||
500 | |a http://repository.upnvj.ac.id/11187/28/BAB%20V.pdf | ||
500 | |a http://repository.upnvj.ac.id/11187/30/DAFTAR%20PUSTAKA.pdf | ||
500 | |a http://repository.upnvj.ac.id/11187/31/LAMPIRAN.pdf | ||
500 | |a http://repository.upnvj.ac.id/11187/32/DAFTAR%20RIWAYAT%20HIDUP.pdf | ||
500 | |a http://repository.upnvj.ac.id/11187/33/ARTIKEL%20KI.pdf | ||
520 | |a Sending or exchanging data is something that often happens in the world of information technology. One of the data that is usually exchanged is voice. Voice is usually used to communicate. The data sent sometimes often contains data that is important and even very confidential and must be kept safe. To maintain data security, it can be done using cryptography. One of the cryptographic techniques is the Advanced Encryption Standard or commonly called AES. There are 3 types of AES, namely: AES-128, AES-192 and AES-256. Sending data via wireless sometimes there is noise, so the data sent is not the same as what is received. To overcome this, it can be done with Forward Error Correction (FEC), which is a method that is able to correct errors from the transmitted information. To encrypt the information from the audio in this study added and controlled by the Secret key Controller and another Interleaver must be added to the output controlled by the Secret key Controller. This study aims to perform cryptography on voice in order to maintain data security by using the Advanced Encryption Standard (AES) cryptographic technique with test parameters namely time, file size and SNR value. The results in this study obtained good encryption with an average filter of 400Hz. | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
690 | |a QA75 Electronic computers. Computer science | ||
690 | |a QA76 Computer software | ||
655 | 7 | |a Thesis |2 local | |
655 | 7 | |a NonPeerReviewed |2 local | |
787 | 0 | |n http://repository.upnvj.ac.id/11187/ | |
787 | 0 | |n http://repository.upnvj.ac.id/ | |
856 | 4 | 1 | |u http://repository.upnvj.ac.id/11187/ |z Link Metadata |