{"title":"Penerapan Algoritma Gronsfeld Dengan Pembangkit Kunci Quicksort Untuk Mengamankan Pesan Rahasia","authors":"Ria Ramadhani Syahputri, Mesran Mesran, Murdani Murdani","doi":"10.47065/josyc.v4i4.4090","DOIUrl":null,"url":null,"abstract":"The numerous issues often encountered in securing confidential messages revolve around message leaks. Message leaks occur through various means, such as eavesdropping. Eavesdropping happens when unauthorized parties manage to access and obtain information from ongoing communications. One way to maintain the confidentiality of secret messages is through encryption and decryption, known as cryptography, achieved by transforming the original message (plaintext) into a secret message (ciphertext). In this study, the results of the encrypted character ciphertext are v, v, w, ^, ™, ʽ, ¦, ¥, -, ¼, Ý, ó, ⁒, x, [], \", [], #, S, a, I, p, p. These findings can serve as an alternative solution to safeguard message confidentiality, ensuring only the message owner and those with knowledge of the key can access it. The Gronsfeld Cipher cryptographic method can also enhance the security of the Quicksort algorithm, a cryptographic algorithm, by generating a more randomized text message that does not reveal patterns connecting it to the original text message.","PeriodicalId":494154,"journal":{"name":"Journal of Computer System and Informatics","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer System and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47065/josyc.v4i4.4090","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The numerous issues often encountered in securing confidential messages revolve around message leaks. Message leaks occur through various means, such as eavesdropping. Eavesdropping happens when unauthorized parties manage to access and obtain information from ongoing communications. One way to maintain the confidentiality of secret messages is through encryption and decryption, known as cryptography, achieved by transforming the original message (plaintext) into a secret message (ciphertext). In this study, the results of the encrypted character ciphertext are v, v, w, ^, ™, ʽ, ¦, ¥, -, ¼, Ý, ó, ⁒, x, [], ", [], #, S, a, I, p, p. These findings can serve as an alternative solution to safeguard message confidentiality, ensuring only the message owner and those with knowledge of the key can access it. The Gronsfeld Cipher cryptographic method can also enhance the security of the Quicksort algorithm, a cryptographic algorithm, by generating a more randomized text message that does not reveal patterns connecting it to the original text message.
在保护机密消息时经常遇到的许多问题都与消息泄漏有关。消息泄漏通过各种方式发生,例如窃听。当未授权方设法访问并从正在进行的通信中获取信息时,就会发生窃听。维护秘密消息的机密性的一种方法是通过加密和解密,即密码学,通过将原始消息(明文)转换为秘密消息(密文)来实现。在本研究中,加密字符密文的结果是v, v, w, ^,™,ai,…,¥,-,¼,Ý, ó,⁒,x,[],“,[],#,S, a, I, p, p。这些结果可以作为保护消息机密性的替代解决方案,确保只有消息所有者和知道密钥的人可以访问它。Gronsfeld Cipher加密方法还可以提高Quicksort算法(一种加密算法)的安全性,通过生成更随机的文本消息,而不会显示与原始文本消息的连接模式。