Analisis Kombinasi Message-Digest Algorithm 5 (MD5) dan Affine Block Cipherterhadap Serangan Dictionary Attack Untuk Keamanan Router Weblogin Hotspot

62

DAFTAR PUSTAKA

Chehal, R. & Singh, K. 2012. Efficiency and security of data with symmetric
encryption algorithms. International Journal of Advanced Research in
Computer Science and Software Engineering2(8):472-475.
Goyal, S., Manna, M., & Goyal, A. 2014.Dictionary Attack on MD5 Hashed Key
Password.The International Journal of Science & Technology2(12): 130-134.
Golose, P.R. 2006. Perkembangan Cybercrime dan upaya Penanganannya di
Indonesia

oleh

Polri.

BULETIN

HUKUM

PERBANKAN


DAN

KEBANKSENTRALAN, Agustus 4(2):29-47.
Gupta & Sandeep. 2014. A Comparative Analysis of SHA and MD5
Algorithm.International Journal of Computer Science and Information
Technologies5(3): 4492-4495.
Kasgar, A.K., Dhariwal, M. K., Tantubay, N., & Malviya, H. 2013.A Review Paper of
Message Digest 5 (MD5).International Journal of Modern Engineering &
Management Research1(4): 29-35.
Kaur, G. 2013. An Efficient Text Storage Security Algorithm Research
Fellow.International Journal of Application or Innovation in Engineering &
Management (IJAIEM)2(6):1-3.
Meneze. A.L, Van Oorschot. P.C & Vanstone. S. 1996. Handbook of Applied
Cryptography.
Mokhtari, M., & Naraghi, H. 2012. Analysis and Design of Affine Cipher and Hill
Cipher.Journal of Mathematic Research4(1):67-77.
Pandey, A., & Bonde, P. 2013. A Modified Approach For Cryptograpic Hash
Function Based On MD5 Algorithm. International Journal of Engineering
Research & Technology2(8):32-36.


Universitas Sumatera Utara

63

Roshdy, R., Fouad, M. & Dahab, M. A., 2013.Design and Implementation A New
Security Hash Algorithm Based on MD5 and SHA-256.International Journal
of Engineering Sciences & Emerging Technologies6(1): 29-36.
Schneier, Bruce. 1996. Applied Cryptography, Second Edition : Protocols, Algorithm,
and Source Code in C. Wiley Computer Publishing.
Solanki, P. S., & Agarwal, V. 2012.Crypt Analyzing of Message Digest Algorithms
MD5 Using Quadratic Salt.International Journal of Science and
Research3(7): 2224-2226.
Shukla, S., & Verma, P.K. 2014.Implementation of Affine Substituin Cipher with
Keyed Transposition Cipher for Enhancing Data Security.International
Journal of Advanced Research in Computer Science and Software
Engineering4(1):236-24.
Sreekanth, A., Aparna, G., Manognya, R., & Kumar, D.R. 2013.Message Security
Through


Digital

Signature

Generation

and

Message

Digest

Algorithm.International Journal of Emerging Technology and Advanced
Engineering3(3): 300-304.
Sreeraj, C., Kumar, K. S., & Nanda, K. R. 2012.Architectural design of MD5
Controller IP Core.International Journal of Scientific & Engineering
Research3(12): 1-5.
Walia, P., & Thapar, V. 2014. Implementation of New Modified MD5-512 bit
Algorithm for Cryptography.International Journal of Innovative Research in
Advanced Engineering1(6): 87-97.

Zelvina, A., Efendi, S & Arisandi, D.2012. Perancangan Aplikasi Pembelajaran
Kriptografi Kunci Publik El Gamal untuk Mahasiswa.Jurnal Dunia
Teknologi Informasi1(1): 56-62.

Universitas Sumatera Utara