Implementasi Algoritma Zig-Zag Cipher Dan Algoritma Rc4+ Cipher Dalam Skema Super Enkripsi Untuk Pengamanan Teks

DAFTAR PUSTAKA

Al Fatta, Hanif. 2007. Analisis & Perancangan Sistem Informasi untuk Keunggulan
Bersaing Perusahaan & Organisasi Modern. Penerbit Andi: Yogyakarta.
Alghazzawi, Daniyal M., Hasan, Syed Hamid. & Trigui, Mohamed Salim. 2013.
Stream Ciphers: A Comparative Study of Attacks and Structures. International
Journal of Computer Applications 1: 27-29.
Ariyus, Dony. 2008. Pengantar ilmu Kriptografi, Teori, analisis dan Implementasi.
Penerbit Andi: Yogyakarta.
Azizah, Ulfah Nur. 2013. Perbandingan Detektor Tepi Prewitt dan Detektor Tepi
Laplacian Berdasarkan Kompleksitas Waktu dan Citra Hasil. Skripsi.
Universitas Pendidikan Indonesia.
Banik, Subhadeep. & Jha, Sonu. 2015. “Some Security Results of The RC4+ Stream
Cipher”. Security and Communication Network, 8(18): 4061-4072.
Biryukov, Alex., Canniѐre, Christophe De., Braeken, An. & Preneel, Bart. 2003. A
Toolbox for Cryptanalysis: Linear and
ffineA Equivalence Al
gorithms*.
Springer-Verlag, 33-50.
Budiman, M A. & Rachmawati, D. 2017. On Using Goldbach G0 Codes and EvenRodeh Codes for Text Compression. IOP Conf. Series: Materials Science and
Engineering 1: 1-5.

Churchhouse, R. F. 2002. Code and Ciphers: Julius Caesar, the Enigma and the
Internet, Cambridge University Press: Cambridge.
Cormen, Thomas H., Leiserson, Chales E., Rivest, Ronald L. & Stein, Clifford. 2009.
Introduction to Algorithms. 3rd Edition. The MIT Press: United State of
America.
Dafid. 2006. Kriptografi Kunci Simetris Dengan Menggunakan Algoritma Crypton.
Jurnal Ilmiah STMIK GI MDP 3: 20-27.
Hartono, Jogiyanto. 2005. Analisis dan Desain Sistem Informasi: Pendekatan
Terstruktur Teori dan Praktik Aplikasi Bisnis. Edisi Ketiga. Andi Offset:
Yogyakarta.
Mollin, R. 2007. An Introduction to Cryptography: Discrete Mathematics and Its
Applications. Kenneth H. Rosen. 2nd Edition. Taylor & Francis Group, LLC:
New York.

Universitas Sumatera Utara

Munir, Rinaldi. 2006. Kriptografi. Penerbit Informatika: Bandung.
Nandal, Aarti.,Singh, Ajit. & Malik, Swati. 2012. Implementation of Caesar Cipher
with Rail Fence for Enhacing Data Security. International Journal of
Advanced Research in Computer Science and Software Engineering, 2 (12):

78-82.
Oppliger, Rolf. 2005. Contemporary Cryptography. Artech House, Inc: London.
Padmapriya, Ph.D, A. & Mu. Annalakshmi, 2013. Zigzag Ciphers: A Novel
Transposition Method. International Journal of Computer Applications (0975
– 8887),8-12.
Paul, Goutam, & Maitra, Subhamoy. 2012. RC4 Stream Cipher and Its Variants. CRC
Press Taylor & Francis Group: London.
Pramanik, Malay B. 2014. Implementation of Cryptography Technique using
Columnar Transposition. International Journal of Computer Applications.
(0975-8887), 19-23.
Pujianto. 2012. Analisis dan Perancangan Sistem Informasi Penjualan Buku Dengan
Konsinyasi Berbasis Client/Server. Jurnal Informatika 2: 118-127.

Sadikin, Rifki. 2012. Kriptografi untuk Keamanan Jaringan dan Implementasinya
dalam Bahasa Java. Andi Offset: Yogyakarta.
Schneier, Bruce. 1996. Applied Cryptography: Protocols, Algorithms, and Source
Code in C. 2nd Edition. New York.
Sebayang, A.M.S. 2014. Implementasi kombinasi beaufort cipher dan affine cipher
pada three-pass protocol. Skripsi. Universitas Sumatera Utara.
Setyaningsih, Emy., Iswahyudi, Catur. & Widyastuti, Naniek. 2011. Konsep Super

Enkripsi Untuk Meningkatkan Kemanan Data Citra. Prosiding Seminar
Nasional Teknologi Informasi (SNASTI 2011), pp. 7-10.
Syuhada, Muhammad Yudha. 2017. Implementasi Algoritma RC4 dan Keyed-Hash
Message Authentication Code (HMAC) Pada Keamanan dan Integritas Short
Message Service (SMS). Skripsi. Universitas Sumatera Utara.
Whitten, Jeffery L., Bentley, Lonnie D., Dittman, Kevin C. 2004. Metode Desain &
Analisis Sistem. Edisi 6. McGraw-Hill: New York.
Whitten, Jeffrey L. & Bentley, Lonnie D. 2007. Systems Analysis & Design Methods.
7th Edition. McGraw-Hill/Irwin: New York.

Universitas Sumatera Utara

Zelvina, Anandia., Efendi, Syahril. & Arisandi, Dedy. 2012. Perancangan Aplikasi
Pembelajaran Kriptografi Kunci Publik ElGamal Untuk Mahasiswa. Jurnal
Dunia Teknologi Informasi 1: 56-62.

Universitas Sumatera Utara