Penerapan Teori Graph dan Aljabar Boolean dalam Kriptografi
DOI:
https://doi.org/10.55606/jurripen.v4i1.6154Keywords:
Graph, Decryption, XNOR, EncryptionAbstract
Advances in technology and computers are utilized in various fields of contemporary applications, especially in cryptography and data security in graph theory applications. By understanding the concepts of graph theory, researchers and developers can design cryptographic algorithms that are stronger, more efficient and resistant to attacks. One of the cryptographic applications that has been implemented is the XNOR algorithm. This algorithm has been applied to encryption and decryption as well as the use of stream ciphers. By using 64 bits, the XNOR algorithm can expand encryption and decryption capabilities and increase the security of encrypted data. In this research, an analysis was carried out regarding information encryption and decryption algorithms with the application and development of the XNOR gate logic circuit method in Boolean algebra and graph theory. This research uses the example of the word MATH, which can be changed into a code or password and vice versa to secure information that you want to keep secret. Apart from that, an analysis of the graph formation of each character in the word MATH was also carried out using Python which produced semi-Euler and Hamilton graphs
Downloads
References
Bai’at, A. A., Fahlevvi, M. R., & Ariandi, W. (2023). Metode Algoritma RC4 (Rivest Code 4) Untuk Pengamanan Database Transaksi Pada Glory Digital Sablon. Explore, 13(1), 20–31. https://doi.org/10.35200/ex.v13i1.33
Khairani, & Siambaton, M. Z. (2023). Pengamanan Data Teks Menggunakan Algoritma Kriptografi Elgamal dan XOR dari Serangan Hacker. Sudo Jurnal Teknik Informatika, 2(4), 176–187. https://doi.org/10.56211/sudo.v2i4.401
Kurniawan, A. (2020). SIMULASI PENGISIAN AIR KETEL MENGGUNAKAN RANGKAIAN IC GERBANG LOGIKA DASAR SESUAI DI KAPAL MV. TANTO SETIA. POLITEKNIK ILMU PELAYARAN.
Prasetyo, Y. D., Armond, A. M., & Ediningrum, W. (2022). PENERAPAN MODEL MATEMATIKA ALGORITMA ANT COLONY OPTIMIZATION DALAM PENENTUAN RUTE BUS TRANS BANYUMAS. JURNAL MATHEMATIC PAEDAGOGIC, 7(1), 12–23. https://doi.org/10.36294/jmp.v7i1.2701
Pratama, Y., & Sutabri, T. (2023). Analisis Kriptografi Algoritma Blowfish pada Keamanan Data menggunakan Dart. Jurnal Informatika Terpadu, 9(2), 126–135.
Rivaldi, M., Harahap, I. Z., Isdianto, H., & Putri, R. A. (2023). Implementasi Algoritma Kriptografi Vigenere Cipher Pada Pengamanan Pesan Text Berbasis Web. Positif: Jurnal Sistem Dan Teknologi Informasi.
Sagayaraj, C. C., Gp, A., Amudha, P., Charles Sagayaraj, A., Sheela, Acs., & Professor, A. (2018). An Application of Graph Theory in Cryptography. International Journal of Pure and Applied Mathematics, 119(13), 375–383.
Siambaton, M. Z. (2023). Pengamanan Data Teks Menggunakan Algoritma Kriptografi Elgamal dan XOR dari Serangan Hacker. Sudo Jurnal Teknik Informatika, 2(4), 176–187.
Sihombing, J. (2019). Penerapan stack dan queue pada array dan linked list dalam java. INFOKOM (Informatika & Komputer), 7(2), 15–24.
Ziliwu, K. B., Maslan, A., & Kremer, H. (2022). Implementasi Caesar Cipher pada Algoritma Kriptografi Klasik dalam Penyandian Pesan. Computer and Science Industrial Engineering (COMASIE), 7(2), 117–126.
Zulkarnain, A. N., Tahir, M., Wahyuningsih, U., Andreani, A. D. P., Firdausi, A., Wijayaningrum, A. I., & Nasihuddin, M. (2023). Analisis Proses Enkripsi Algoritma Kriptografi Modern Advanced Encryption Standard (AES). Jurnal Adijaya Multidisplin, 1(02), 380–387.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 JURNAL RISET RUMPUN ILMU PENDIDIKAN

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
_001.jpg)




