Pengamanan Data Pasien Di UPT. Puskesmas Pujon Kalimantan Tengah Menggunakan Kriptografi Super Enkripsi

Lee Valdho Falensky(1*), Magdalena A. Ineke Pakereng(2),

(1) FTI UKSW
(2) FTI UKSW
(*) Corresponding Author

Abstract


Along with the development of information and communication technology nowaday, data security in exchanging information is increasingly important. One technique that can be used to secure the data is super encryption cryptography. Super encryption is a cryptographic technique that combines two or more algorithms. In this research, the encryption decryption process data text of patient biodata of Technical Implementation Unit Pujon Health Center Central Kalimantan was conducted using three cryptography, namely Columnar Transposition, Vigenere Cipher and Monoalphabetic. The result of this research is that the super encryption that has been built can encode (encrypt) and return (decrypt) messages in text. data text of patient biodata of Technical Implementation Unit Pujon Health Center Central Kalimantan tested, before decryption encryption and after decryption encryption did not change the number of characters. The number of characters does not affect the speed of the process because the number of characters used can produce the same processing speed

Full Text:

PDF

References


. A. Ilmiah et al., “Perancangan Super Enkripsi Menggunakan Metode Substitusi S-Box AES dan Metode Transposisi dengan Pola Vertical-Horizontal,” 2016.

. S. Budi, A. B. Purba, and J. Mulyana, “Pengamanan File Dokumen Menggunakan Kombinasi Metode Subtitusi Dan Vigenere Cipher,” Ilk. J. Ilm., vol. 11, no. 3, pp. 222–230, 2019, doi: 10.33096/ilkom.v11i3.477.222-230.

. E. Gunadhi and A. Sudrajat, “Pengamanan Data Rekam Medis Pasien Menggunakan Kriptografi Vigènere Cipher,” J. Algoritm., vol. 13, no. 2, pp. 295–301, 2017, doi: 10.33364/algoritma/v.13-2.295.

. J. Sasongko, “Pengamanan Data Informasi menggunakan Kriptografi Klasik,” vol. X, no. 3, pp. 160–167, 2005.

. F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Inform. Mulawarman J. Ilm. Ilmu Komput., vol. 10, no. 1, p. 20, 2016, doi: 10.30872/jim.v10i1.23.

. N. D. Nathasia and a. E. Wicaksono, “Penerapan Teknik Kriptografi Stream-Cipher Untuk Pengaman Basis Data,” ICT Research Center UNAS, vol. 6, no. 1. pp. 1–22, 2011.

. Fatima, “Artikel Ilmiah Artikel Ilmiah,” STIE Perbanas Surabaya, no. 682012043, pp. 0–16, 2020.

. Y. Reswan, U. Juhardi, and B. T. Yuliansyah, “Implementasi Kompilasi Algoritma Kriptografi Transposisi Columnar Dan Rsa Untuk Pengamanan Pesan Rahasia,” J. Inform. Upgris, vol. 4, no. 2, 2019, doi: 10.26877/jiu.v4i2.2812.

. Y. Permanasari, “Kriptografi Klasik Monoalphabetic,” Matematika, vol. 16, no. 1, pp. 7–10, 2017, doi: 10.29313/jmtm.v16i1.2543.




DOI: http://dx.doi.org/10.30645/j-sakti.v6i2.484

Refbacks

  • There are currently no refbacks.



J-SAKTI (Jurnal Sains Komputer & Informatika)
Published Papers Indexed/Abstracted By:


Jumlah Kunjungan :

View My Stats