Of data and information important aspects. Security and confidentiality problem is one Mushroomed viruses, bugs, spam and hackers Search-engine continues to grow along with Increasingly lively, internet no longer guarantee The speed encryption process need 3 times longer than the decryption.Īverage of time in encryption process need 0,365 second, while decryption process need 0,0936 second. The program can be implemented to maintain the confidentiality of the data The data succeed to be encrypted orĭecrypted and irreversible. Library Chilkat Encryption ActiveX can be used to secure the data. Twofish algorithm implementation using Ms. Phases: plan, design, code, test, and release. Visual Basic we use Chilkat Encryption ActiveX. To facilitate the implementation of theĬoding in Ms. Third step processing the input bits in 16 times Feistel network. Input bit into 4 parts, the second step was performed XOR operation between bit input with a key, and the There are 3 steps in Twofish algorithm, the first step is divide Twofish operate on aīlock of plaintext consisting of 128 bits. This study implements TwofishĬryptographic algorithm using library Chilkat Encryption ActiveX Ms. SECURITY IN A COMMUNICATION NETWORK USINGĭepartment of Computer Science, Semarang State University, IndonesiaĮmail: is required to secure the data networks communication. IMPLEMENTATION TWOFISH ALGORITHM FOR DATA Journal of Theoretical and Applied Information Technology IMPLEMENTATION TWOFISH ALGORITHM FOR DATA SECURITY IN A COMMUNICATION NETWORK USING LIBRARY CHILKAT ENCRYPTION ACTIVEX Keywords: Data security, Twofish, Chilkat Encryption ActiveX Average of time in encryption process need 0,365 second, while decryption process need 0,0936 second. The speed encryption process need 3 times longer than the decryption. The program can be implemented to maintain the confidentiality of the data when transmitted over the Internet. The data succeed to be encrypted or decrypted and irreversible. Visual Basic and library Chilkat Encryption ActiveX can be used to secure the data. This research using agile methods with phases: plan, design, code, test, and release. To facilitate the implementation of the coding in Ms. There are 3 steps in Twofish algorithm, the first step is divide input bit into 4 parts, the second step was performed XOR operation between bit input with a key, and the third step processing the input bits in 16 times Feistel network. Twofish operate on a block of plaintext consisting of 128 bits. This study implements Twofish cryptographic algorithm using library Chilkat Encryption ActiveX Ms. Cryptography is required to secure the data networks communication.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2023
Categories |