Perancangan Program Aplikasi Kriptografi Menggunakan Algoritma Magenta dengan Panjang Kunci 128 Bit
DOI:
https://doi.org/10.21512/comtech.v1i1.2240Keywords:
128-bit key length, cryptography, algorithms magentaAbstract
Along with the development of computer technology, the growing crimes against the computer. Crimes against the computer makes people increasingly competing to make the algorithms-algorithms that can maintain the confidentiality of data. Algorithms algorithm Magenta is one of the many algorithms that exist today. Magenta algorithms have been developed since 1990 by using a simple and transparent technique that can be implemented in hardware and software. First time algorithms are analyzed using the butterfly structure - the structure of the butterfly which was then replaced by a Fast Hadamard Transform (FHT) shuffle structure which has the advantage of providing some structure in each level. In 1994 there was a slight change in the use of hardware that was not processed according to plan so that now the algorithm used by Deutsche Telekom Magenta for secure management of sensitive data with 128-bit key length. These algorithms break the 128-bit key length into 16 blocks with each block containing the 8-bit and one other advantage of this algorithm is the recursive part is calculated repeatedly at each iteration.Plum Analytics
References
Jacobson Jr, M. J., and Huber K. The Magenta Block Cipher Algorithm. Retrieved on August 10, 2004 from http://www.madchat.org/crypto/magenta.pdf.
Pfleeger, C. P. (1989). Security in computing, Englewood Cliff: Prentice Hall.
Soplanit, S. (2004). Bahan kuliah security computer, Jakarta: Program Studi Teknik Informatika, Fakultas Teknologi Informasi, Universitas Tarumanagara.
Stallings, W. (1995). Network and internetwork security, New York: Prentice Hall Inc.
Tannenbaum, A. S. (1989). Computer network, New York: Prentice Hall Inc.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: