PENERAPAN ALGORITMA KOMPRESI LZW DAN ALGORITMA KRIPTOGRAFI TWOFISH DALAM PENGAMANAN FILE DIGITAL

In this era of digitalization, the use of files is not only in the form of print, but can be in the form of digital files, one of which has the advantage of being able to store files into digital file storage devices offline and online. However, storing files that have not been given protection can...

Full description

Saved in:
Bibliographic Details
Main Author: Clarissa Nabila, (Author)
Format: Book
Published: 2021-07-20.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_11227
042 |a dc 
100 1 0 |a Clarissa Nabila, .  |e author 
245 0 0 |a PENERAPAN ALGORITMA KOMPRESI LZW DAN ALGORITMA KRIPTOGRAFI TWOFISH DALAM PENGAMANAN FILE DIGITAL 
260 |c 2021-07-20. 
500 |a http://repository.upnvj.ac.id/11227/1/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/11227/2/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/11227/3/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/11227/4/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/11227/5/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/11227/6/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/11227/7/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/11227/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/11227/9/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/11227/10/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/11227/11/ARTIKEL%20KI.pdf 
520 |a In this era of digitalization, the use of files is not only in the form of print, but can be in the form of digital files, one of which has the advantage of being able to store files into digital file storage devices offline and online. However, storing files that have not been given protection can threaten the security of the confidentiality of the information from the file. Therefore, this study uses the LZW compression algorithm method to reduce data redundancy and Twofish cryptography to provide security protection against the confidentiality of digital file contents. The results of this study show that the combination of the LZW compression algorithm and the Twofish cryptography has succeeded in securing the contents of digital files in the form of text files (* .txt), Word, Excel, and PDF by generating random ciphertext based on the frequency test. The size of the processed digital files affects the computation time required for the encode and decode processes. The encoding process succeeded in changing the file to illegible meaning, and the decoding process succeeded in returning the encoded file to its original state so that its meaning could be read. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a QA Mathematics 
690 |a QA75 Electronic computers. Computer science 
690 |a QA76 Computer software 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/11227/ 
787 0 |n https://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/11227/  |z Link Metadata