Implementasi Algoritma Goverment Standard (GOST) dalam Pengamanan File Dokumen
Abstract
Dokumentasi dalam teknologi saat ini adalah hal yang tak dapat terlepas dari kebutuhan suatu lembaga atau instansi dimana dokumen adalah hal yang paling sering digunakan baik dalam bentuk dokumen manual maupun dalam bentuk file teks dalam komputer. Oleh karena itu,.keamanan data atau dokumen rahasia sangat dibutuhkan dalam bisnis maupun pribadi. Tetapi dalam pengiriman atau pengamanan file data yang bersifat rahasia masih kurang dalam sistem keamanan data. Maka dari itu perlu keamanan tambahan untuk proses penyimpanan file baik itu file yang di rasa pribadi maupun data dalam keorganisasian dengan menggunakan proses enkripsi dan deskripsi menggunakan metode Government Standard (GOST). Maka data penting dapat lebih terjaga dan dengan adanya aplikasi ini kita dapat mengenkripsi data untuk menjaga kerahasiaan file yang kita simpan. Aplikasi ini dibangun dengan menggunakan Visual Studio 2010.
Downloads
References
H. Azis, “Network steganography system using covert channel for LSBS stego data on VOIP communication,” Int. J. Eng. Adv. Technol., vol. 8, no. 5, pp. 1448–1449, 2019.
H. Azis and F. Fattah, “Analisis Layanan Keamanan Sistem Kartu Transaksi Elektronik Menggunakan Metode Penetration Testing,” Ilk. J. Ilm., vol. 11, no. 2, p. 167, 2019.
A. Djamalilleil, M. Muslim, Y. Salim, E. I. Alwi, H. Azis, and Herman, “Modified Transposition Cipher Algorithm for Images Encryption,” Proc. - 2nd East Indones. Conf. Comput. Inf. Technol. Internet Things Ind. EIConCIT 2018, pp. 1–4, 2018.
M. Nazeri, A. Rezai, and H. Azis, “An Efficient Architecture for Golay Code Encoder,” Proc. - 2nd East Indones. Conf. Comput. Inf. Technol. Internet Things Ind. EIConCIT 2018, pp. 114–117, 2018.
F. Muharram, H. Azis, and A. R. Manga, “Analisis Algoritma pada Proses Enkripsi dan Dekripsi File Menggunakan Advanced Encryption Standard (AES),” Pros. Semin. Nas. Ilmu Komput. dan Teknol. Inf., vol. 3, no. 2, pp. 112–115, 2018.
Y. Salim and H. Azis, “Metode Digital Watermark Pada File Penelitian Dosen,” Ilk. J. Ilm., vol. 9, no. 2, pp. 161–166, 2017.
H. Azis and R. Wardoyo, “Penerapan Network Steganography Menggunakan Metode Modifikasi LACK Dan Layanan Message Authentication Code Pada Voip Network Steganography System with modification of LACK and Message Authentication Code on VoIP,” Semin. Nas. Komun. dan Inform., pp. 13–19, 2015.
Copyright (c) 2020 Indonesian Journal of Data and Science
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- The work is not under consideration for publication elsewhere.
- The work has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with Indonesian Journal of Data and Science agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. (CC BY-NC 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.