Cryptography of Java Language Using Basa Walikan Methods in Yogyakarta

Hero Wintolo, Asih Pujiastuti, Ellyana Mega Dewantri Astuti

Abstract


Basa Walikan can be used as one of the methods in cryptography because the Basa Walikan character exchange process is not easily understood by all people who can speak Javanese. Basa Walikan used in this research  is Basa-Walikan in Yogyakarta, which is sourced from Javanese script characters written in a two-line countdown rule. In Roman characters it becomes ha, na, ca, ra, ka, da, ta, sa, wa, la, pa, dha, ja, yes, nya, ma, ga, ba, tha, nga. The characters in Javanese script are written in 4 (four) lines. The process of character reversal in Basa Walikan uses the mechanism of the first line exchanged with the third line and the second line is swapped to the fourth line as well as the opposite. In this research software for message safety with Basa Walikan was made. From the White Box and Black Box test results it can be concluded that the encryption process and the description process are in accordance with the design of the application being made. If the word being tested is two consonants m and p that are close together, then the encryption process and the description process is done separately or by character.


Keywords


Cryptography, Basa Walikan, Web Based

References


Wijaya, R. E., & Mangoting, Y. (2014). Boso Walikan Malangan Dalam Perspektif Earning Management: Suatu Kreativitas Bahasa Akuntansi. Seri Akuntansi Multiparadigma Indonesia, 1(1), 47-56.

Prayogi, I. (2013). Proses Pembentukan Slang Malang. SASINDO, 1(1 Januari).

Hermawan, N. F. (2014). Basa Walikan “Slang Jawa”. El-Wasathiya: Jurnal Studi Agama, 2(2), 224-245.

Qurniawan, W., Wintolo, H., & Nugraheny, D. (2012). Penerapan Sistem Keamanan Dengan Kriptografi Advanced Encryption Standard (AES) Dan Key Administrator Pada Sinkronisasi File. Compiler, 1(2).

Riyadi, W. (2017). Kriptografi Symmetric-Key Cryptosystem Dengan Metode AES (Advanced Encryption Standard) 256bit. Jurnal Processor, 11(1), 709-719.

Purnama, B. (2017). Pengamanan Pesan Rahasia Melalui Kriptografi Vigenere Cipher Dengan Kunci Berlapis. Jurnal Processor, 9(3), 264-269.

Widodo, A. P., Sarwoko, E. A., Suharto, E., & Siahaan, J. F. O. (2016). Pengamanan Data Foto Pada Perangkat Os Android Menggunakan Teknik Kriptografi Hill Cipher. JISKA (Jurnal Informatika Sunan Kalijaga), 1(2).

Muttaqin, M., Sajati, H., & Retnowati, N. (2014). Penerapan Sistem Keamanan Menggunakan Cryptography Pada Aplikasi Chatting Dengan Memodifikasi Algoritma Rivest Shamir Adleman (RSA). Compiler, 3(1).

Wintolo, H., Retnowati, N. D., & Fendriyanto, P. (2013, December). Penerapan Alogritma Lipat Pada Steganografi Yang Memanfaatkan Rms (Record Management System) Di J2ME. In Conference SENATIK STT Adisutjipto Yogyakarta (Vol. 1, pp. 76-84).

Wintolo, H., Pujiastuti, A., & Imam, M. (2018, November). Use of Lipat Algorithm on Android to Secure Data Communication in Social Media. In Conference SENATIK STT Adisutjipto Yogyakarta (Vol. 4, pp. 375-384).




DOI: http://dx.doi.org/10.28989/senatik.v5i0.292

Article Metrics

Abstract view : 396 times
PDF (Bahasa Indonesia) - 249 times

Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Conference SENATIK P-ISSN :2337-3881 and  E-ISSN : 2528-1666

Jumlah penggunjung = Web Analytics orang

Statistik Senatik

Flag Counter