Implementasi Algoritma Quicksort Untuk Pembangkitan Kunci Algoritma Elgamal Pada Pengamanan Data File Dokumen
Abstract
A valid document is an important article containing information. Typically, documents are written on paper and the information is written in ink either by hand or using electronic media. For that we need a security system to secure the contents of the documents contained therein. In this research, a cryptographic method is used that will ensure the security of a document file. In this research, there is a security process that uses the Elgamal algorithm method as a solution to the implementation of the Quicksort algorithm method for document files. The results of this study indicate that the visual basic application can determine whether document files are safe or not. Using this method can help by securing the contents of a document file so that it is not known easily. Quicksort implementation that uses the Elgamal algorithm will be implemented using the visual basic application as evidence of the results of securing document files safely
References
Agus Kurniadi, “Implementasi kriptografi ELGAMAL dalam keamanan pesan,” INFOTEK, vol. 1, pp. 1–5, 2016.
Listiyono, Hersatoto. “Implementasi Algoritma Kunci Public Pada Algoritma RSA”. Fakultas Teknologi Informasi, Universitas Stikubank, Semarang, 2009.
Munir, Rinaldi. Kriptografi, Informatika, Bandung. 2006.
R. Sadikin, KRIPTOGRAFI UNTUK KEAMANAN JARINGAN. YOGYAKARTA: C.V ANDI OFFSET, 2012
R. Sedgewick. Implementing quicksort programs. Comm. ACM, 21:847–856, 1978.
G.J Renier, Sejarawan dari Universitas Collage London,(1997; 104).
jon E. Bella Ariska, suroso, “Rancangan Kriptografi HYBRID kombinasi metode Vigenere Cipher dan ELGAMAL Pada pengamanan pesan Rahasia,” Semin. Nas. Inov. dan Apl. Teknol. di Ind., 2018.
R. Zendrato and A. U. Hamdani, “Pemodelan Sistem Informasi Pengadaan Alat dan Bahan Praktikum Menggunakan Unified Modeling Language (Studi Kasus: Program Pendidikan Dokter Gigi Spesialis Konservasi Gigi Fakultas Kedokteran Gigi Universitas XYZ),” Konf. Nas. Teknol. Inf. dan Komput., vol. I, no. 1, pp. 86–95, 2017.
I. Fahmi, Manajemen Pengambilan Keputusan Teori dan Aplikasi. Bandung: PT. Alfabeta, 2016.
Z. I, “Pemodelan Berbasis UML (Unified Modeling Language) dengan Strategi Teknik Orientasi User Centered Design (UCD) dalam Sistem Administrasi Pendidikan,” Univ. Islam Negeri Sumatra Utara Medan, no. January 2013, 201.
D. Ariyus, Kriptografi keamanan data dan komunikasi. Graha Ilmu.
W. Komputer, Membuat Aplikasi Client Server dengan Visual Basic 2008. Yogyakarta: Andi, 2010.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma Quicksort Untuk Pembangkitan Kunci Algoritma Elgamal Pada Pengamanan Data File Dokumen
Pages: 17-24
Copyright (c) 2022 Armansyah Ritonga

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).

