IMPLEMENTASI ALGORITMA AES DAN BCRYPT UNTUK PENGAMANAN FILE DOKUMEN
With the current development of Covid-19 case, The public is advised to reduce outside activities, so Microsoft Office and PDF are very important for data exchange. Unfortunately, the data becomes vulnerable to attack, so cryptography is needed so that document files can be protected. It is necessar...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2022-07-30.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repoupnvj_19710 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Gebrina Divva Meuthia Zulma, . |e author |
245 | 0 | 0 | |a IMPLEMENTASI ALGORITMA AES DAN BCRYPT UNTUK PENGAMANAN FILE DOKUMEN |
260 | |c 2022-07-30. | ||
500 | |a http://repository.upnvj.ac.id/19710/1/ABSTRAK.pdf | ||
500 | |a http://repository.upnvj.ac.id/19710/2/AWAL.pdf | ||
500 | |a http://repository.upnvj.ac.id/19710/3/BAB%20I.pdf | ||
500 | |a http://repository.upnvj.ac.id/19710/4/BAB%20II.pdf | ||
500 | |a http://repository.upnvj.ac.id/19710/5/BAB%20III.pdf | ||
500 | |a http://repository.upnvj.ac.id/19710/7/BAB%20IV.pdf | ||
500 | |a http://repository.upnvj.ac.id/19710/9/BAB%20V.pdf | ||
500 | |a http://repository.upnvj.ac.id/19710/10/DAFTAR%20PUSTAKA.pdf | ||
500 | |a http://repository.upnvj.ac.id/19710/11/DAFTAR%20RIWAYAT%20HIDUP.pdf | ||
500 | |a http://repository.upnvj.ac.id/19710/12/LAMPIRAN.pdf | ||
500 | |a http://repository.upnvj.ac.id/19710/14/HASIL%20PLAGIARISME.pdf | ||
500 | |a http://repository.upnvj.ac.id/19710/13/ARTIKEL%20KI.pdf | ||
520 | |a With the current development of Covid-19 case, The public is advised to reduce outside activities, so Microsoft Office and PDF are very important for data exchange. Unfortunately, the data becomes vulnerable to attack, so cryptography is needed so that document files can be protected. It is necessary to make a web-based application using the Laravel framework where document files will be encrypted using AES 256 then the secret key will be hashed using Bcrypt. The expected results of the research are a web that can be used to secure document files using AES and Bcrypt. | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
690 | |a QA75 Electronic computers. Computer science | ||
655 | 7 | |a Thesis |2 local | |
655 | 7 | |a NonPeerReviewed |2 local | |
787 | 0 | |n http://repository.upnvj.ac.id/19710/ | |
787 | 0 | |n https://repository.upnvj.ac.id/ | |
856 | 4 | 1 | |u http://repository.upnvj.ac.id/19710/ |z Link Metadata |