YUSUF, MUHAMMAD and Mulya, Megah and Arsyalan, Osyari (2019) PENERAPAN JARINGAN SARAF PROPAGASI BALIK PADA KRIPTOGRAFI SIMETRI UNTUK DATA TEKS. Undergraduate thesis, Sriwijaya University.
Text
RAMA_55201_09021381520043_0020026609_0028068806_01_FRONT_REF.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (11MB) |
|
Text
RAMA_55201_09021381520043_0020026609_0028068806_02.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (305kB) |
|
Text
RAMA_55201_09021381520043_0020026609_0028068806_03.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (373kB) |
|
Text
RAMA_55201_09021381520043_0020026609_0028068806_04.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (1MB) |
|
Text
RAMA_55201_09021381520043_0020026609_0028068806_05.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (164kB) |
|
Text
RAMA_55201_09021381520043_0020026609_0028068806_06.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (13kB) |
|
Text
RAMA_55201_09021381520043_0020026609_0028068806_06_REF.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (74kB) | Request a copy |
Abstract
Research on data security has been carried out and developed with various security methods. One of the existing data security techniques is cryptography which is a method of converting original data into other data that has no meaning for parties who do not have access to data. There are two cryptography methods, namely symmetric and asymmetric key cryptography that have differences in the number of keys used. In this study, symmetric key cryptographic methods will be combined with one field of artificial intelligence, namely backpropagation with the aim of adding a variety of security to the symmetric key cryptography method. Therefore, the question arises is how the process of combining the two methods and adjusting the data used on the system. Experiments in this study used test data as many as 10 text data. The experimental results that have been carried out in this study indicate that the system built can produce different cipher texts in each experiment with different values of the original data by 85% and the accuracy of encryption process is in the range of 50% to 80%. Keywords: Symmetric cryptography, backpropagation neural networks, text data.
Item Type: | Thesis (Undergraduate) |
---|---|
Subjects: | T Technology > T Technology (General) > T57.6-57.97 Operations research. Systems analysis T Technology > T Technology (General) > T58.5-58.64 Information technology |
Divisions: | 09-Faculty of Computer Science > 55201-Informatics (S1) |
Depositing User: | Users 186 not found. |
Date Deposited: | 25 Jul 2019 07:33 |
Last Modified: | 25 Jul 2019 07:33 |
URI: | http://repository.unsri.ac.id/id/eprint/739 |
Actions (login required)
View Item |