Penerapan Algoritma CAST-128 pada Proses Enkripsi dan Dekripsi Teks
DOI:
https://doi.org/10.53842/juki.v2i1.25Keywords:
Implementation, Encryption, Decryption, text and CAST-128 Algorithm.Abstract
Encoding was first made using a classic algorithm. This algorithm builds its security on the confidentiality of the algorithm used. However, this algorithm is inefficient when used to communicate with many people because the algorithm is still very simple and still very easy to solve, so important information or data that you want to keep secret can be easily discovered by other people or people who are not responsible. CAST-128 is a cryptographic algorithm that is said to be similar to the DES algorithm which uses 16 rounds of feistel network as one of its strengths. Where in the process of encryption and decryption of text CAST-128 uses a 64-bit block length and key lengths of up to 128 bits. For information, the CAST-128 algorithm is referred to as one of the strong cryptographic algorithms against various types of cryptanalysis, including differential and linear attacks. With the application of the CAST-128 algorithm in the process of encrypting and decrypting text, it will be more difficult to decode text encoded by people who do not know the key so as to create more security than the encoded text. So when the text wants to be sent or transferred to the flashdisk will be more confidential.Downloads
References
D. Ariyus, “Kriptografi keamanan data dan komunikasi,” Yogyakarta Graha Ilmu, 2006.
M. Qamal, “Kriptografi File Citra Menggunakan Algoritma Tea (Tiny Encryption Algorithm),” TECHSI - J. Penelit. Tek. Inform., 2014.
R. Munir, “Kriptografi,” Inform. Bandung, 2006.
J. Simarmata et al., “Implementation of AES Algorithm for information security of web-based application,” Int. J. Eng. Technol., vol. 7, no. 3.4 Special Issue 4, 2018.
T. Limbong et al., “The implementation of computer based instruction model on Gost Algorithm Cryptography Learning,” in IOP Conference Series: Materials Science and Engineering, 2018, vol. 420, no. 1, p. 12094.
Z. Hercigonja, “Comparative Analysis of Cryptographic Algorithms,” Int. J. Digit. Technol. Econ., vol. 1, no. 2, pp. 127–134, 2016.
G. N. Krishnamurthy, “Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images,” Netw. Secur., vol. 1, no. 1, pp. 28–33, 2009.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 JUKI : Jurnal Komputer dan Informatika

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.






