Javascript must be enabled to continue!
ANALISIS EFEKTIVITAS DAN EFISIENSI METODE ENCODING DAN DECODING ALGORITMA BASE64
View through CrossRef
This study discusses the methods of encoding and decoding the base64 cryptographic algorithm. The term encoding means a process of converting plaintext into ciphertext. While decoding is a term that means the process of turning ciphertext back into plaintext. In general, classical cryptography has been abandoned because of its logic which can be easily solved, so now it has switched to modern cryptography which operates in bit-binary mode which is formed from ASCII code. The base64 algorithm is a form of modern cryptography which is included in the modern type of block cipher cryptography. This study aims to obtain a comparison between 3 types of tools in carrying out a cryptographic encode and decode process on the base64 algorithm. The 3 types of tools include the Base64 Python Program, Bash Base64 Kali Linux, and CyberChef which are online tools. This type of research method uses qualitative methods because it tends to use analysis in research. Where the results of the first comparison are used to make it easier to see the accuracy of the encoding and decoding processes and the results of the second comparison are used to compare in terms of time efficiency when encoding the three tools using 1,000 words which will continue to be added by 4,000 words, up to a total of 9,000 words . These words are taken using dummy text (lorem ipsum).
Title: ANALISIS EFEKTIVITAS DAN EFISIENSI METODE ENCODING DAN DECODING ALGORITMA BASE64
Description:
This study discusses the methods of encoding and decoding the base64 cryptographic algorithm.
The term encoding means a process of converting plaintext into ciphertext.
While decoding is a term that means the process of turning ciphertext back into plaintext.
In general, classical cryptography has been abandoned because of its logic which can be easily solved, so now it has switched to modern cryptography which operates in bit-binary mode which is formed from ASCII code.
The base64 algorithm is a form of modern cryptography which is included in the modern type of block cipher cryptography.
This study aims to obtain a comparison between 3 types of tools in carrying out a cryptographic encode and decode process on the base64 algorithm.
The 3 types of tools include the Base64 Python Program, Bash Base64 Kali Linux, and CyberChef which are online tools.
This type of research method uses qualitative methods because it tends to use analysis in research.
Where the results of the first comparison are used to make it easier to see the accuracy of the encoding and decoding processes and the results of the second comparison are used to compare in terms of time efficiency when encoding the three tools using 1,000 words which will continue to be added by 4,000 words, up to a total of 9,000 words .
These words are taken using dummy text (lorem ipsum).
Related Results
Evaluation of the impact of extreme storm surge and rainfall in coastal areas
Evaluation of the impact of extreme storm surge and rainfall in coastal areas
<p>Under global warming, extreme meteorological events may increase in some regions in terms of both frequency and intensity in the future. Low-lying coastal areas ma...
ARTIKEL ALGORITMA PEMROGRAMAN SERI MINTA UBA HASIBUAN
ARTIKEL ALGORITMA PEMROGRAMAN SERI MINTA UBA HASIBUAN
Algoritma merupakan akar dari sebuah sistem yang terbentuk dalam dunia pemrograman.Melalui serangkaian cara yang masuk akal dan teratur, sebuah algoritma dapat menyelesaikan suatu ...
Analisis Perbandingan Algoritma Local Binary Patterns Histogram (LBPH) Dan Algoritma Convolutional Neural Network (CNN) Pada Sistem Pengenalan Wajah
Analisis Perbandingan Algoritma Local Binary Patterns Histogram (LBPH) Dan Algoritma Convolutional Neural Network (CNN) Pada Sistem Pengenalan Wajah
Dalam sistem pengamanan dan verifikasi digital, kata sandi sering digunakan tetapi memiliki kerentanan terhadap manipulasi dan pencurian. Untuk mengatasi masalah ini, metode altern...
Improving Decodability of Polar Codes by Adding Noise
Improving Decodability of Polar Codes by Adding Noise
This paper presents an online perturbed and directed neural-evolutionary (Online-PDNE) decoding algorithm for polar codes, in which the perturbation noise and online directed neuro...
Perbandingan Algoritma Boruvka Dan Algoritma Sollin Pada Optimasi Kebutuhan Kabel Fiber Optik Universitas Bengkulu
Perbandingan Algoritma Boruvka Dan Algoritma Sollin Pada Optimasi Kebutuhan Kabel Fiber Optik Universitas Bengkulu
Optimasi adalah hal penting dalam suatu algoritma. Ini dapat menghemat kebutuhan dalam suatu kegiatan. Pada Minimum Spanning Tree, yang ingin dicapai adalah bagaimana semua vertexs...
Perbandingan Algoritma Kriptografi Modern dalam Melindungi Data Transmisi
Perbandingan Algoritma Kriptografi Modern dalam Melindungi Data Transmisi
Keamanan data transmisi merupakan aspek penting dalam sistem informasi modern seiring meningkatnya pertukaran data melalui jaringan terbuka. Berbagai ancaman seperti penyadapan, ma...
STUDI ANALISIS EFISIENSI STEAM TURBINE GENERATOR PADA BAGIAN ASAM SULFAT DAN UTILITAS DEPARTEMEN PRODUKSI IIIB PT PETROKIMIA GRESIK
STUDI ANALISIS EFISIENSI STEAM TURBINE GENERATOR PADA BAGIAN ASAM SULFAT DAN UTILITAS DEPARTEMEN PRODUKSI IIIB PT PETROKIMIA GRESIK
Sejumlah energi penggerak peralatan proses sangat diperlukan dalam proses produksi di seluruh pabrik yang ada pada PT Petrokimia Gresik. Departemen Produksi IIIB memiliki unit util...
Transcriptomics extract the key chromium resistance genes of Cellulomonas
Transcriptomics extract the key chromium resistance genes of Cellulomonas
Abstract
Cellulomonas fimi Clb-11 can reduce high toxic Cr (VI) to low toxic Cr (III). In this study, transcriptomics was used to analyze the key genes, which was involved ...

