Suradnya, Putu (2013) Implementasi Algoritma RC4 Enkripsi Dan Dekripsi Pada File Suara Wav. Other thesis, Sekolah Tinggi Teknik Musi.
Text
IF-2013-308012-cover.pdf Download (118kB) |
|
Text
IF-2013-308012-abstract.pdf Download (8kB) |
|
Text
IF-2013-308012-tableofcontent.pdf Download (104kB) |
|
Text
IF-2013-308012-chapter1.pdf Download (105kB) |
|
Text
IF-2013-308012-chapter2.pdf Restricted to Repository staff only Download (848kB) |
|
Text
IF-2013-308012-chapter3.pdf Restricted to Repository staff only Download (558kB) |
|
Text
IF-2013-308012-chapter4.pdf Restricted to Repository staff only Download (650kB) |
|
Text
IF-2013-308012-conclusion.pdf Download (89kB) |
|
Text
IF-2013-308012-reference.pdf Download (486kB) |
|
Text
IF-2013-308012-summary_id.pdf Restricted to Repository staff only Download (380kB) |
|
Text
IF-2013-308012-complete.pdf Restricted to Repository staff only Download (2MB) |
Abstract
Currently, digital media security especially in wav sound file is very important to be kept confidential. This has to do with copyright. For that developed a method that aims to randomize wav sound file, so it can not be manipulated and falsified by others who are not interested. The encryption method is one kind of safety data, one using the RC4 algorithm. RC4 uses a key length from 1 to 256 bits are used to initialize the table along 256 bits. RC4 has an S-Box, S0, S1, ....., S255, which contains a permutation of the numbers 0 to 255. Using two indices i and j in the algorithm. Index i is used to ensure that an element changed, while the index j will ensure that an element changed randomly. Essentially, the algorithm encryption method will generate pseudorandom bytes of key XOR operation will be subject to the plaintext to produce the ciphertext. And to produce the original plaintext, the ciphertext it will be subject to the pseudorandom byte XOR operation her. From testing research on the application of the RC4 algorithm wav sound files obtained some results. First, the greater the capacity wav sound files are processed, the longer it takes. Because, the larger the file size, then the contents of pengacakkan wav sound files will also be longer. Second, the keys used in the encryption and decryption must be the same or symmetry. Third, the capacity of the file before and after the change are not encrypted.
Item Type: | Thesis (Other) |
---|---|
Additional Information: | Skripsi Lengkap dapat dibaca di Ruang Referensi Perpustakaan UKMC Kampus Bangau. |
Uncontrolled Keywords: | Cryptography, the RC4 algorithm, wav format sound files. |
Subjects: | T Technology > T Technology (General) |
Divisions: | Theses - S1 > Informatics Study Program |
Depositing User: | Perpustakaan Unika Musi Charitas |
Date Deposited: | 19 Jan 2018 13:00 |
Last Modified: | 23 Mar 2018 12:48 |
URI: | http://eprints.ukmc.ac.id/id/eprint/700 |
Actions (login required)
View Item |