APLIKASI PEMBELAJARAN KRIPTOGRAFI MENGGUNAKAN ALGORITMA EL-GAMAL DAN STEGANOGRAFI BERBASIS DESKTOP

N.H, Irwan Marga (2019) APLIKASI PEMBELAJARAN KRIPTOGRAFI MENGGUNAKAN ALGORITMA EL-GAMAL DAN STEGANOGRAFI BERBASIS DESKTOP. Skripsi thesis, Universitas Muhammadiyah Sukabumi.

[img] Text
COVER.pdf

Download (80kB)
[img] Text
LEMBAR PENGESAHAN PEMBIMBING.pdf

Download (366kB)
[img] Text
LEMBAR PERNYATAAN BEBAS PLAGIAT.pdf

Download (413kB)
[img] Text
BAB I.pdf

Download (189kB)
[img] Text
BAB II.pdf
Restricted to Repository staff only

Download (382kB) | Request a copy
[img] Text
BAB III.pdf
Restricted to Repository staff only

Download (166kB) | Request a copy
[img] Text
BAB IV.pdf
Restricted to Repository staff only

Download (683kB) | Request a copy
[img] Text
BAB V.pdf
Restricted to Repository staff only

Download (769kB) | Request a copy
[img] Text
BAB VI.pdf

Download (148kB)

Abstract

In computer lectures, cryptography is one of the courses taught. Cryptographic learning is very important for computer students to know the ways to secure data. Cryptography is a science based on mathematical techniques to deal with security and information such as confidentiality, data integrity and entity authentication. In other words cryptography encodes the original text (plaintext) into cipher text (ciphertext). To encrypt an original message into a password message (encryption) or change the password message back to the original message (decryption) a secret key is required. One of the cryptographic systems is the El- Gamal Cryptography System. El-Gamal Cryptography System is a cryptographic system with asymmetry keys, where the key to encrypt and decrypt is different. To implement the El-Gamal Cryptography System, a desktop-based application was created. El-Gamal cryptographic application is equipped with an encryption process, decryption and Steganography techniques for hiding plaintext into an image. The steps for implementing El-Gamal cryptography begin with the generation of public keys and secret keys. The public key is used when encryption then produces ciphertext, the application of Steganography begins with inserting a ciphertext into an image (stegoimage), then before the decryption process, then extracting the ciphertext from the image, the secret key is used to decrypt the text to produce the original message (plaintext ) The results of this study will be implemented in an application program using the C # programming language. From this study El-Gamal cryptographic learning application will be produced which can make it easier for students to study cryptography.

Item Type: Thesis (Skripsi)
Uncontrolled Keywords: Cryptography, El-Gamal, Encryption, Decryption, Steganography
Subjects: T Technology > T Technology (General)
Divisions: Fakultas Sains dan Teknologi > Teknik Informatika
Depositing User: Perpus ID UMMI
Date Deposited: 19 Dec 2019 03:09
Last Modified: 19 Dec 2019 03:09
URI: http://eprints.ummi.ac.id/id/eprint/1168

Actions (login required)

View Item View Item