HAKIKAT DAN FILSAFAT ILMU KRIPTOGRAFI

Authors

  • Rizki Ariyani Universitas Gunadarma

DOI:

https://doi.org/10.56127/juit.v1i1.1725

Keywords:

Essence, Philosophy, Cryptography

Abstract

The foundation of a science is a fundamental thing that must be known. The essence of a science is the foundation of that science. The essence and philosophy are interconnected in knowledge, so in a science, the origins of the development of knowledge can be understood. The science that is currently developing is certainly driven by the nature and philosophy of that science, which serves as the basis for research development. Cryptography is one of the sciences developed based on mathematics applied to the security of communication. Cryptography currently encompasses the security of communication in information technology. The discussion of this research is about the thoughts and opinions from the literature related to the nature and philosophy of cryptography, its history, development, and its application as security in information technology.

References

Suaedi. Pengantar Filsafat Ilmu. IPB Press. Bogor, 2016.

Paulus W. Filsafat Ilmu Pengetahuan. Pustaka Diamond. Yogyakarta, 2016.

Raja O.T dan Carolus S. Pengantar Filsafat Untuk Psikologi. Kanisius.Yogyakarta. 2017.

Husain et al. “Filsafat Ilmu Komputer dan Cloud Computing Secara Etimologis.” Jurnal Mantik Penusa, Volume 2 (1), Pages 15-21. Retrieved from http://ejurnal.pelitanusantara.ac.id/index.php/mantik/article/view/377. 2018.

Mohammad N. “Pengembangan Prototype Sistem Kriptografi Untuk Enkripsi dan Dekripsi Data Ofice Menggunakan Metode Blowfish dengan Bahasa Pemrograman Java.” Jurnal Ilmiah Teknik Informatika FORMAT, Volume 6(1), Pages 87-105. Retrieved from https://publikasi.mercubuana.ac.id/index.php/format/article/view/1532. 2017.

M.R. Joshi and R.A. Karkade. “Network Security with Cryptography.” International Journal of Computer Science and Mobile Computing, Volume 4(1). Pages 201-204. 2015.

A. J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied Cryptography. Bosa Roca: CRC Press. 1996.

Tobias K, Cecilia P, and Rainer B. “On the Difficulty of Hiding Keys in Neural Networks.” In Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec ’20). Association for Computing Machinery, New York, NY, USA, 73–78. DOI:https://doi.org/10.1145/3369412.3395076. 2020.

Daewon L, Tae W. O, and Kibom K. “Deep Audio Steganalysis in Time Domain.” In Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec ’20). Association for Computing Machinery, New York, NY, USA, 11–21. DOI:https://doi.org/10.1145/3369412.3395064. 2020.

Rachid A and Mohammad T. A. “A Dynamic Visualisation of the DES Algorithm and a Multi-faceted Evaluation of Its Educational Value.” In Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE ’20). Association for Computing Machinery, New York, NY, USA, 370–376. DOI:https://doi.org/10.1145/3341525.3387386. 2020.

Downloads

Published

2022-01-19

How to Cite

Rizki Ariyani. (2022). HAKIKAT DAN FILSAFAT ILMU KRIPTOGRAFI. Jurnal Ilmiah Teknik, 1(1), 42–46. https://doi.org/10.56127/juit.v1i1.1725

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.