80 Asep Rizal Nurjaman, 2016
MODIFIKASI ALGORITMA DATA ENCRYPTION STANDARD (DES) 64 BIT UNTUK PENGAMANAN PADA PENYIMPANAN FILE
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu DAFTAR PUSTAKA
Aleisa, N. (2015). A Comparison of the 3DES and AES Encryption Standards.
International Journal of Security and its aplications, 241-246. Amish Kumar, M. N. (2012). EFFECTIVE IMPLEMENTATION AND
AVALANCHE EFFECT OF AES . International Journal of Security, Privacy and Trust Management ( IJSPTM), Vol. 1, No 3/4, 31-35. bobsusanto. (2015, agustus 13). http://www.seputarpengetahuan.com/2015/08.
Retrieved from http://www.seputarpengetahuan.com/:
http://www.seputarpengetahuan.com/2015/08/5-pengertian-file-menurut-para-ahli-lengkap.html
Huda, M. (2009). Perkembangan Enkripsi Fungsi Hash pada SHA (Secure Hash Algorithm). Bandung: Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung.
komputer, I. (2012, November 19).
http://www.infokomputer.com/2012/11/berita/keluhan-5-layanan-cloud-storage/. Retrieved from http://www.infokomputer.com/:
http://www.infokomputer.com/2012/11/berita/keluhan-5-layanan-cloud-storage/
Kovacs, E. (2015, agustus 5). https://www.h11dfs.com/man-in-the-cloud-attack/. Retrieved from https://www.h11dfs.com/man-in-the-cloud-attack/: https://www.h11dfs.com/man-in-the-cloud-attack/
Krishnamurthy, G., & Ramaswamy, D. (2008). Making AES Stronger: AES with Key Dependent S-Box. International Journal of Computer Science and Network Security, Vol.8 No.9, 388-398.
Kromodimoeljo, S. (2009). Teori dan Aplikasi Kriptorafi . SPK IT Consulting. Mahajan, D. P., & Sachdeva, A. (2013). A STUDY OF ENCRYPTION
ALGORITHMS AES, DES AND RSA FOR SECURITY. Global Journal of Computer Science and Technology Network and Web Security, 15-21. Mandal, A. K., & Tiwari, A. T. (2012). Analysis of Avalanche Effect in Plaintext
80 Asep Rizal Nurjaman, 2016
MODIFIKASI ALGORITMA DATA ENCRYPTION STANDARD (DES) 64 BIT UNTUK PENGAMANAN PADA PENYIMPANAN FILE
81
Asep Rizal Nurjaman, 2016
MODIFIKASI ALGORITMA DATA ENCRYPTION STANDARD (DES) 64 BIT UNTUK PENGAMANAN PADA PENYIMPANAN FILE
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu
Menezes, A. J., Oorschot, P. C., & Vanstone, S. A. (1996). HANDBOOK of APPLIED CRYPTOGRAPHY. Boca Raton: Massachusetts Institute of Technology.
Munir, R. (2004). Data Encryption Standard (DES). Bandung: Departemen Teknik Informatika Institut Teknologi Bandung.
Mushtaque, M. A., & Dhiman, H. (2014). Evaluation of DES, TDES, AES, Blowfish and Two fish Encryption Algorithm: Based on Space
Complexity. International Journal of Engineering Research & Technology (IJERT), 283-286.
Primartha, R. (2011). Penerapan Enkripsi dan Dekripsi File Menggunakan Algoritma Data Encryption Standard(DES). Jurnal Sistem Informasi, 371-387.
Prof.N..Penchalaiah, & Dr.R.Seshadri. (2010). Effective Comparison and
Evaluation of DES and Rijndael Algorithm (AES). (IJCSE) International Journal on Computer Science and Engineering, 1641-1645.
Rahardjo, B. (2005). Keamanan Sistem Informasi Berbasis Internet. Bandung: PT Insan Infonesia .
Sadikin, R. (2012). Kriptografi untuk Keamanan Jaringan. Yogyakarta: Andi. Sommerville, I. (2011). Software Enginering 9th Edition. Pearson.
Sonjaya, I. (2007). Uji Homogenitas Data Iklim Di Statsiun Klimatologi Banjarbaru. Banjarbaru: Stasiun Klimatologi Banjarbaru.
Sriram Ramanujam, M. K. (2011). Designing an algorithm with high Avalanche Effect. IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.1, 106-111.
Stallings, W. (2011). Cryptography and Network Security Principles and Practice. USA,1 Lake Street: Upper Saddle, NY 07458.