Santoso, Alloysius Perkasa Adi (2018) Implementasi Algoritma Elgamal Untuk Enkripsi Dan Dekripsi Berbasis Web. Other thesis, Universitas Katolik Musi Charitas.
Text
IF-2018-1413017-cover.pdf Download (33kB) |
|
Text
IF-2018-1413017-abstract.pdf Download (6kB) |
|
Text
IF-2018-1413017-tableofcontent.pdf Download (117kB) |
|
Text
IF-2018-1413017-chapter1.pdf Download (32kB) |
|
Text
IF-2018-1413017-chapter2.pdf Restricted to Repository staff only Download (675kB) | Request a copy |
|
Text
IF-2018-1413017-chapter3.pdf Restricted to Repository staff only Download (542kB) | Request a copy |
|
Text
IF-2018-1413017-chapter4.pdf Restricted to Repository staff only Download (717kB) | Request a copy |
|
Text
IF-2018-1413017-conclusion.pdf Download (8kB) |
|
Text
IF-2018-1413017-reference.pdf Download (12kB) |
|
Text
IF-2018-1413017-attachment.pdf Restricted to Repository staff only Download (489kB) | Request a copy |
|
Text
IF-2018-1413017-complete.pdf Restricted to Repository staff only Download (3MB) | Request a copy |
|
Text
IF-2018-1413018-summary_id .pdf Restricted to Repository staff only Download (687kB) | Request a copy |
Abstract
The large number of Internet tapers and crimes that occur today with the development of technology makes people easily access the internet makes a lot of opportunities to commit crime. Data security is something everyone wants to keep privacy. To maintain the security of the document data can be applied cryptographic algorithm so avoid the interruption, interception, modification, and fabrication. One of the algorithms that can be used is the algorithm ElGamal cryptography because many studies that use this algorithm. The security of the ElGamal algorithm lies in the difficulty of calculating the discrete logarithms of large prime modulo so that attempts to solve this logarithmic problem become difficult to solve thus the document data will remain intact.
Item Type: | Thesis (Other) |
---|---|
Additional Information: | Skripsi Lengkap dapat dibaca di Ruang Referensi Perpustakaan UKMC Kampus Bangau. |
Uncontrolled Keywords: | cryptographic, ElGamal, interruption, interception, modification. |
Subjects: | T Technology > T Technology (General) |
Divisions: | Theses - S1 > Informatics Study Program |
Depositing User: | Perpustakaan Unika Musi Charitas |
Date Deposited: | 30 Nov 2018 00:47 |
Last Modified: | 30 Nov 2018 00:47 |
URI: | http://eprints.ukmc.ac.id/id/eprint/1749 |
Actions (login required)
View Item |