Penerapan Teori Graph dan Aljabar Boolean dalam Kriptografi

Authors

  • I Putu Jefa Kurniadi Universitas Udayana
  • Ni Luh Desy Muliani Universitas Udayana
  • Ni Kadek Ayu Lestari Dewi Universitas Udayana

DOI:

https://doi.org/10.55606/jurripen.v4i1.6154

Keywords:

Graph, Decryption, XNOR, Encryption

Abstract

Advances in technology and computers are utilized in various fields of contemporary applications, especially in cryptography and data security in graph theory applications. By understanding the concepts of graph theory, researchers and developers can design cryptographic algorithms that are stronger, more efficient and resistant to attacks. One of the cryptographic applications that has been implemented is the XNOR algorithm. This algorithm has been applied to encryption and decryption as well as the use of stream ciphers. By using 64 bits, the XNOR algorithm can expand encryption and decryption capabilities and increase the security of encrypted data. In this research, an analysis was carried out regarding information encryption and decryption algorithms with the application and development of the XNOR gate logic circuit method in Boolean algebra and graph theory. This research uses the example of the word MATH, which can be changed into a code or password and vice versa to secure information that you want to keep secret. Apart from that, an analysis of the graph formation of each character in the word MATH was also carried out using Python which produced semi-Euler and Hamilton graphs

 

Downloads

Download data is not yet available.

References

Bai’at, A. A., Fahlevvi, M. R., & Ariandi, W. (2023). Metode Algoritma RC4 (Rivest Code 4) Untuk Pengamanan Database Transaksi Pada Glory Digital Sablon. Explore, 13(1), 20–31. https://doi.org/10.35200/ex.v13i1.33

Khairani, & Siambaton, M. Z. (2023). Pengamanan Data Teks Menggunakan Algoritma Kriptografi Elgamal dan XOR dari Serangan Hacker. Sudo Jurnal Teknik Informatika, 2(4), 176–187. https://doi.org/10.56211/sudo.v2i4.401

Kurniawan, A. (2020). SIMULASI PENGISIAN AIR KETEL MENGGUNAKAN RANGKAIAN IC GERBANG LOGIKA DASAR SESUAI DI KAPAL MV. TANTO SETIA. POLITEKNIK ILMU PELAYARAN.

Prasetyo, Y. D., Armond, A. M., & Ediningrum, W. (2022). PENERAPAN MODEL MATEMATIKA ALGORITMA ANT COLONY OPTIMIZATION DALAM PENENTUAN RUTE BUS TRANS BANYUMAS. JURNAL MATHEMATIC PAEDAGOGIC, 7(1), 12–23. https://doi.org/10.36294/jmp.v7i1.2701

Pratama, Y., & Sutabri, T. (2023). Analisis Kriptografi Algoritma Blowfish pada Keamanan Data menggunakan Dart. Jurnal Informatika Terpadu, 9(2), 126–135.

Rivaldi, M., Harahap, I. Z., Isdianto, H., & Putri, R. A. (2023). Implementasi Algoritma Kriptografi Vigenere Cipher Pada Pengamanan Pesan Text Berbasis Web. Positif: Jurnal Sistem Dan Teknologi Informasi.

Sagayaraj, C. C., Gp, A., Amudha, P., Charles Sagayaraj, A., Sheela, Acs., & Professor, A. (2018). An Application of Graph Theory in Cryptography. International Journal of Pure and Applied Mathematics, 119(13), 375–383.

Siambaton, M. Z. (2023). Pengamanan Data Teks Menggunakan Algoritma Kriptografi Elgamal dan XOR dari Serangan Hacker. Sudo Jurnal Teknik Informatika, 2(4), 176–187.

Sihombing, J. (2019). Penerapan stack dan queue pada array dan linked list dalam java. INFOKOM (Informatika & Komputer), 7(2), 15–24.

Ziliwu, K. B., Maslan, A., & Kremer, H. (2022). Implementasi Caesar Cipher pada Algoritma Kriptografi Klasik dalam Penyandian Pesan. Computer and Science Industrial Engineering (COMASIE), 7(2), 117–126.

Zulkarnain, A. N., Tahir, M., Wahyuningsih, U., Andreani, A. D. P., Firdausi, A., Wijayaningrum, A. I., & Nasihuddin, M. (2023). Analisis Proses Enkripsi Algoritma Kriptografi Modern Advanced Encryption Standard (AES). Jurnal Adijaya Multidisplin, 1(02), 380–387.

Downloads

Published

2025-07-08

How to Cite

I Putu Jefa Kurniadi, Ni Luh Desy Muliani, & Ni Kadek Ayu Lestari Dewi. (2025). Penerapan Teori Graph dan Aljabar Boolean dalam Kriptografi. JURNAL RISET RUMPUN ILMU PENDIDIKAN, 4(1), 777–786. https://doi.org/10.55606/jurripen.v4i1.6154