Pehitungan Enkripsi
public BigInteger enkripsiBigInteger p_or_c{ return BigInteger.ModPowp_or_c, e, p;
}
Perhitungan Dekripsi public BigInteger dekripsiBigInteger c{
return BigInteger.ModPowc, d, p; }
}
d. Fungsi Elias Gamma
private static string e_elias_gammaint i{ if i == 1
return 1; int encoding = 0;
StringBuilder sb = new StringBuilder int N_zero = intMath.Log10i Math.Log102;
int remaining = intMath.Pow2, N_zero; sb.Append0, N_zero;
sb.Append1; sb.AppendConvert.ToStringi remaining,2.P
adLeftN_zero, 0; left padding sebanyak n zero return sb.ToString;
} Kompresi
public static byte [] kompresibyte [] s_values{ flag = 0;
Listbyte hasil = new Listbyte; byte bitcount = 0, bitbuffer = 0;
values = s_values; susun_char;
encoding; foreach byte val in values{
foreachchar ch in eg_encoding[val]{ bitbuffer = 1;
bitbuffer |= byte.Parsech.ToString; bitcount++;
if bitcount == 8{ hasil.Addbitbuffer;
bitcount = 0; bitbuffer = 0;
Universitas Sumatera Utara
} }
} if bitcount 0
{ byte cagak = Convert.ToBytenew StringBuilder
.Append1.Append0, bitcount.ToString, 2; bitbuffer |= cagak;
flag = 1; hasil.Addbitbuffer;
} return hasil.ToArray;
}
Dekomresi
public static byte [] dekompresibyte [] s_values{ Listbyte hasil = new Listbyte;
int i = 0; StringBuilder sb = new StringBuilder;
for i = 0;i s_values.Length - 1;i++{ sb.AppendConvert.ToStrings_values[i],
2.PadLeft8, 0; }
if flag == 1 sb.AppendConvert.ToStrings_values[i], 2.
Remove0, 1; else
sb.AppendConvert.ToStrings_values[i], 2.PadLeft8, 0;
decodinghasil, sb; return hasil.ToArray;
}
Universitas Sumatera Utara
DAFTAR PUSTAKA
Antoni, .2015. Analisis Hasil Kompresi Data Teks Pada Algoritma Elias Gamma Code, Elias Delta Code Dan Levenstein Code. Skripsi. Universitas Sumatera Utara.
Bhattacharjee, A.K., Bej, T. Agarwal, S. 2013. Comparison study of lossless data compression algorithms for text data. International Journal of Computer
Engineering pp 15 – 19.
Dennis, Alan., Wixom, B.H. Roth R.M. 2012. System Analysis and Design. 5
th
Edition. John Wiley Sons, Inc: United States of America. Hasdiana, .2015. Hill Cipher pada Skema Shamirs Three Pass Protocol. Skripsi.
Universitas Sumatera Utara. Hardiyana, Nadya S. 2013. Implementasi algoritma kriptografi Massey-Omura dengan
teknik steganografi kombinasi end of file EOF dan first of file FOF untuk keamanan data. Skripsi. Universitas Sumatera Utara
Kanamori, Y., Yoo, Seong-Moo.2009.Quantum Three-Pass Protocol: Key Distribution Using Quantum Superposition States. International Journal of Network
Security Its Applications.Vol 1 No 2 Kodituwakku, S.R. Amarasinghe, U.S. 2010. Comparison of Lossless Data
Compression Algorithms for Text Data. Journal of Computer Science and Engineering 4 : 416
– 426. Kromodimoeldjo, Sentot. 2010. Teori dan Aplikasi Kroptografi. SPK IT Konsulting.
Lubis, W.A. 2015. Penyandian Data Teks Dengan Algoritma Elgamal Dan Algoritma Kompresi Data Dengan Algoritma Elias Gamma Code. Skripsi. Universitas
Sumatera Utara. Mollin, R. 2007. An Introduction to Cryptography: Discrete Mathematics and Its
Applications. Kenneth H. Rosen. 2
nd
Edition. Taylor Francis Group, LLC: New York.
Pressman, Roger S. 2012. Rekayasa Perangkat Lunak – Buku Satu. Edisi Ketujuh.
ANDI : Yogyakarta. Reza, M., Budiman, M.A. Arisandi, D. 2012. Simulasi Pengamanan File Teks
Menggunakan Algoritma Massey-Omura. Journal Dunia Teknologi Informasi 1:20-27.
Universitas Sumatera Utara
Sadikin, Rifki. 2012. Kriptografi untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java. Andi Offset: Yogyakarta.
Salomon, D. 2007. Variable-length Codes for Data Compression. Springer-Verlag : London.
Salomon Motta . 2010. Handbook of Data Compression. Fifth Edition, Computer Science Department. California State University, Northridge, Springer-Verlag
: London. Schneier, B. 1996. Applied Cryptography: Protocols, Algorithms, and Source Code in
C. 2
nd
Edition. New York. Sebayang, A.M.S. 2014. Implementasi Kombinasi Beaufort Cipher dan Affine Cipher
pada Three-Pass Protocol. Skripsi. Universitas Sumatera Utara. Siregar, S.R. 2016. Perbandingan Algoritma Fibonacci Code dan Algoritma Inverted
Elias Gamma Code Dalam Kompresi File Teks. Skripsi. Universitas Sumatera Utara.
Sujiono, D.M.R. 2016. Implementasi three pass protocol dengan kombinasi algoritma beaufort cipher dan one time pad untuk pengamanan data. Skripsi. Universitas
Sumatera Utara. Whitten, J.L. Bentley, L.D. 2007. System Analysis and Design Methods. 7th Edition.
McGraw-HillIrwin: New York. Yan, Song Y.Computtational Number Theory and Modern Cryptography.2013.
Beijing: Colleges of Science.
Universitas Sumatera Utara
BAB 3
ANALISIS DAN PERANCANGAN
3.1. Analisis Sistem