Implementasi Kriptografi Hybrid Crypto Sistem Algoritma RSA – Naïve Dan Algoritma Zig-Zag Dalam Pengamanan File

69

DAFTAR PUSTAKA
Annalakshmi Mu, Padmapriya . 2013. Zigzag Cipher: A Novel
Transposition Method. International Journal of Computer Applications
(0975 – 8887) International Conference on Computing and information
Technology (IC2IT-2013)
Ariyus, Dony. 2006. Kriptografi Keamanan Data dan Komunikasi. Yogyakarta:
Penerbit Graha Ilmu
Arifin Zainal, 2009. Studi Kasus Penggunaan Algoritma RSA Sebagai Algoritma
Kriptografi yang Aman, Jurnal Informatika Mulawarman Vol 4 No. 3
Ariyus Dony. 2008. Pengantar Ilmu KRIPTOGRAFI Teori, Analisis, dan
Implementasi, Yogyakarta: ANDI
Balasubramanian Kannan. 2014. Variants of RSA and their Cryptanalysis. International
Conference on Communication and Network Technologies (ICCNT)
Bakthiari majid, Maarof Mohd Aizaini. 2012. Serious Security Weakness in RSA
Cryptosystem. IJCSI International Journal of Computer Science Issues, Vol. 9,
Issue 1, No 3, January 2012 ISSN (Online): 1694-0814
C* Navaneethan, 2016. ADVANCED RAIL FENCE CIPHER ALGORITHM.
Navaneethan C* et al. /International Journal of Pharmacy & Technology
Dafid. 2006. Kriptografi Kunci Simetris Dengan Menggunakan Algoritma Crypton.

Jurnal Ilmiah STMIK GI MDP 3: 20-27.
Goshwe.Nentawe Y. 2013. Data Encryption and Decryption Using RSA Algorithm in
a Network Environment. IJCSNS International Journal of Computer Science and
Network Security, VOL.13 No.7
Ginting Albert, Ismanto R. Rizal, Windasari Ike Pertiwi.2015. Implementasi Algoritma
Kriptografi RSA untuk Enkripsi dan Dekripsi Email. Jurnal teknologi dan sistem
komputer, Vol3, No.2, April 2015(e-ISSN: 2338-0403).
Hari Eko Rachmawanto, Atika Christy Sari. 2015. Keamanan File Menggunakan
Teknik Kriptografi Shift Cipher. Techno.COM, Vol. 14, No. 4, November 2015:
329-335
Kurniawan Yusuf, 2004. Kriptografi keamanan internet dan jaringan komputer,
Bandung: Informatika Bandung
Munir, Rinaldi. 2006. Kriptografi. Bandung, Indonesia: Penerbit Informatika.
Munir, Rinaldi. 2006. Tipe dan Mode Algoritma Simetri. Bandung: Institut
Teknologi Bandung
Mollin, Richard A. 2007. An Introduction to Cryptography 2nd Edition. New York:
Taylor & Francis Group, LLC.
Nandal, Aarti., Singh, Ajit. & Malik, Swati. 2012. Implementation of Caesar Cipher
with Rail Fence for Enhacing Data Security. International Journal of Advanced
Research in Computer Science and Software Engineering, 2 (12): 78-82.

Patel Gaurav R, Panchal Prof.Krunal.2014. Hybrid Encryption Algorithm. IJEDR |
Volume 2, Issue 2 | ISSN: 2321-9939

Universitas Sumatera Utara

70

P.Smart Nigel. 2016. Ceriptograpy Made Simple. New York: Springer
Internasional Publishing Switzerland
Pramanik, Malay B. 2014. Implementation of Cryptography Technique using Columnar
Transposition. International Journal of Computer Applications. (0975-8887),
19-23.
Sadikin Rifki. 2012. Kriptografi untuk keamanan jaringan dan dasar matematika
untuk kriptografi, Yogyakarta: ANDI
Shankara Meenakshi, P.Akshaya. 2014. Hybrid Cryptographic Technique Using RSA
Algorithm and Schenduling Concepts. International Journal of Network Security
& Its Applications (IJNSA) Vol.6, No.6
Singh Soram Ranbir, Khan Kumar Ajoy. 2016. Performance Evaluation of RSA and
Elliptic Curve Cryptography. 2nd International Conference on Contemporary
Computing and Informatics (ic3i)

Wandani Henny, Andri Budiman Muhammad, Sharif Amer . 2012. Implementasi
Sistem Keamanan Data dengan Menggunakan Teknik Steganografi End of
File (EOF)
dan Rabin Public Key Cryptosystem. Jurnal. Program Studi
S1 Ilmu Komputer, Universitas Sumatera Utara

Universitas Sumatera Utara