J-SAKTI (Jurnal Sains Komputer dan Informatika)
Vol 2, No 1 (2018): EDISI MARET

Penyandian File Word Berdasarkan Algoritma Rivest Code 5 (RC5)

Widodo Arif Prabowo (STMIK Budidarma Medan)
Annisa Fitri Harahap (STMIK Budidarma Medan)
Ridha Ismadiah (STMIK Budidarma Medan)



Article Info

Publish Date
27 Mar 2018

Abstract

Nowadays, important data in the form of word files have been widely used. But there are still few who apply security techniques to the important files. Files that are confidential or important, if they fall into the hands of others may be misused or manipulated for certain purposes. The existence of document security applications built on cryptographic algorithms is one solution to solve the above problems. Cryptographic techniques secure a data or important files by encoding the data into a cipher that is difficult to understand again by others. The RC5 algorithm is one of the cryptographic technique algorithms that can be used to encode text from word files based on the RC5 algorithm so that it can improve the expression of important and confidential word files.

Copyrights © 2018






Journal Info

Abbrev

jsakti

Publisher

Subject

Computer Science & IT Control & Systems Engineering Decision Sciences, Operations Research & Management Energy

Description

J-SAKTI adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa yang berfokus di bidang Manajemen Informatika. Pengiriman artikel tidak dipungut biaya, kemudian artikel yang diterima akan diterbitkan secara online dan dapat diakses secara gratis. Topik dari J-SAKTI adalah sebagai berikut (namun ...