Basa Walikan can be used as one of the methods in cryptography because the Basa Walikan character exchange process is not easily understood by all people who can speak Javanese. Basa Walikan used in this research is Basa-Walikan in Yogyakarta, which is sourced from Javanese script characters written in a two-line countdown rule. In Roman characters it becomes ha, na, ca, ra, ka, da, ta, sa, wa, la, pa, dha, ja, yes, nya, ma, ga, ba, tha, nga. The characters in Javanese script are written in 4 (four) lines. The process of character reversal in Basa Walikan uses the mechanism of the first line exchanged with the third line and the second line is swapped to the fourth line as well as the opposite. In this research software for message safety ...
Tidak diijinkan karya tersebut diunggah ke dalam aplikasi Repositori Perpustakaan Universitas karena...
Cryptography is a solution or method of securing the data precisely to preserve confidentiality and ...
Hill Cipher is a symmetric cryptographic algorithm that can be used to encrypt and decrypt. Hill Cip...
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text cipher...
Kriptografi adalah teknik mengamankan data. Untuk meningkatkan keamanannya, kriptografi perlu dikemb...
In the world of Internet nothing is really safe. There's always a gap in any application made. Likew...
This thesis is focused on encryption with Java libraries. Goal si to compare the libraries in the al...
The following paper presents the possibilities of applying Java language to encrypt e-mail messages....
Data security technique known as cryptographic now influential and widespread use. There are a lot o...
Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertex...
Data security is one of the important issues in the development of information technology today. One...
Cryptography is a science which studying about safety of messages, so it makes themessages cannot be...
As had been widely circulated special program data protection either freeware, shareware, and commer...
The development of communication technology such as the use of mobile phones based on android. Andro...
Abstract—Security of data in a computer is needed to protect critical data and information from othe...
Tidak diijinkan karya tersebut diunggah ke dalam aplikasi Repositori Perpustakaan Universitas karena...
Cryptography is a solution or method of securing the data precisely to preserve confidentiality and ...
Hill Cipher is a symmetric cryptographic algorithm that can be used to encrypt and decrypt. Hill Cip...
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text cipher...
Kriptografi adalah teknik mengamankan data. Untuk meningkatkan keamanannya, kriptografi perlu dikemb...
In the world of Internet nothing is really safe. There's always a gap in any application made. Likew...
This thesis is focused on encryption with Java libraries. Goal si to compare the libraries in the al...
The following paper presents the possibilities of applying Java language to encrypt e-mail messages....
Data security technique known as cryptographic now influential and widespread use. There are a lot o...
Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertex...
Data security is one of the important issues in the development of information technology today. One...
Cryptography is a science which studying about safety of messages, so it makes themessages cannot be...
As had been widely circulated special program data protection either freeware, shareware, and commer...
The development of communication technology such as the use of mobile phones based on android. Andro...
Abstract—Security of data in a computer is needed to protect critical data and information from othe...
Tidak diijinkan karya tersebut diunggah ke dalam aplikasi Repositori Perpustakaan Universitas karena...
Cryptography is a solution or method of securing the data precisely to preserve confidentiality and ...
Hill Cipher is a symmetric cryptographic algorithm that can be used to encrypt and decrypt. Hill Cip...