Kriptanalisis DES menggunakan Jaringan Syaraf Tiruan
Main Article Content
Abstract
Article Details
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with FIDELITY : Jurnal Teknik Elektro agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Jurnal FIDELITY : Jurnal Teknik Elektro is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Accepted 2022-04-09
Published 2022-05-31
References
William Stallings, "Cryptography and Network Security", 3 edition, Pearson Education (Asia) Pvt.Ltd./Prentice Hall of India, 2003.
Dr. K. S. Ooi and Brain Chin Vito, "Cryptanalysis of S-DES", 2002.
Carlos Gershenson, "Artificial Neural Networks for Beginners"
Ajith Abraham, "Artificial Neural Networks "
Fiona Nielsen, "Neural Networks – algorithms and applications"
Rudra Pratap, "Getting started with Mat Lab 6.0"
K.V .Srinivas Rao , M. Rama Krishna and D. Bujji Babu, "Cryptanalysis of a feistel Type Block Cipher by Feed Forward Neural Network Using Right Sigmoidal Signals",2009
Howard M. Heys ,"A Tutorial on Linear and Differential Cryptanalysis" Memorial University of Newfoundland, email: [email protected]
Anders Krogh, "What are artificial neural networks? "
Simon Haykin , "Feedforward Neural Networks : An Introduction"
Craig Smith ,"Basic Cryptanalysis Techniques" , November 17th, 2001.
Khaled M. Alallayah , Waiel F. Abd El-Wahed, Mohamed Amin and Alaa H. Alhamami , "Attack of Against Simplified Data Encryption Standard Cipher System Using Neural Networks", Journal of Computer Science 6 (1): 29-35, 2010
RC Chakraborty , "Fundamentals of Neural Networks", June 01 ,2010
Subariah Ibrahim,Mohd Aizaini Maarof, "A Review On Biological Inspired Computation In Cryptology", Universiti Teknologi Malaysia, Skudai 81300, Johore, Malaysia.
www.infosecuritymag.com/articles/july01/columns_logoff.shtml
Kaisa Nyberg , "Methods for Symmetric Key Cryptography and Cryptanalysis", 2009.
S N Sivanandam, S Sumathi, S N Deepa, "Introduction To Neural Networks Using MATLAB 6.0",2006
Girish Kumar Jha, "Artificial Neural Networks And Its Applications", I.A.R.I, New Delhi, [email protected]
Reaffirmed,"Data Encryption Standard (DES)", U.S. Department Of Commerce/National Institute of Standards and Technology, 1999 October 25
Biham, E. and Shamir, A.:"A Differential Cryptanalysis of the Data Encryption Standard", Springer Berlin Heidelberg New York, 1993.
H. Feistel, "Cryptography and computer privacy," Sci. Amer., vol. 228, no. 5,pp. 15-23, May 1973.
W. Diffie, M. Hellman, "Exhaustive cryptanalysis of the NBS data encryption standard," Computer, pp. 74-78, June 1977.
Martin Albrecht and Carlos Cid, "Algebraic Techniques in Differential Cryptanalysis" Information Security Group, Royal Holloway, University of London Egham, Surrey TW20 0EX, United Kingdom