Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Edu Komputika Journa...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Edu Komputika Journal
Article . 2018
Data sources: DOAJ
addClaim

PENGAMANAN TEKS PADA DOKUMEN EMAIL MENGGUNAKAN ENKRIPSI ROTOR

Authors: Arief Arfriandi;

PENGAMANAN TEKS PADA DOKUMEN EMAIL MENGGUNAKAN ENKRIPSI ROTOR

Abstract

The delivery of a letter electronically are very popular the last few years, so many people utilize to send important documents to the destination. Electronic mail that is commonly referred to by email, use the internet access in its operation. The email when sent, realistically not up to the destination but kept on the server the owner of email services. After the email is saved to the server then the email can be read by the destination written email account when sending email. When data or documents stored on the server can be potentially exploited by the email service providers without the permission of the owner of the data, it is certainly a security issue related to the data confidentiality of the data. To maintain the confidentiality of such data, one of the methods that is believed to be able to cope with it is Cryptography. In this study, researchers developed a technique of securing text on document email using cryptography method with rotor encryption. Research methods used were derived from a review of the literature to find out the model of the safeguards text in the document. Then analyze the weaknesses of earlier related research based pengemanan the text of the document. The next step is followed by the design of the rotor encryption implementation on the text message and continues to perform calculations using rotor encryption on the text of the document to be sent via email. The results of securing the text in documents that will be sent via email, is expected to enhance the confidentiality of data when stored on the server.

Keywords

LC8-6691, Information technology, T58.5-58.64, Special aspects of education

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
gold