Kombinasi Mode Cipher Block Chaining Dengan Algoritma Triangle Chain Cipher Pada Penyandian Login Website

Dafirius Lombu(1*), Siska Dame Tarihoran(2), Irwan Gulo(3),

(1) STMIK Budidarma Medan
(2) STMIK Budidarma Medan
(3) STMIK Budidarma Medan
(*) Corresponding Author

Abstract


Generally, the database access of a website lies in the user login. When the login data is not accompanied by security techniques, it is very easily accessible by other parties. One effort that can be done to solve the problem is to encode the login data of website users based on cryptographic technique algorithm. Triangle Chain Cipher (TCC) is one of the classic cryptographic algorithms that encode data doubly and generate keys randomly along the plain. The process of encryption and decryption are interdependent to be one of the advantages of this algorithm. This algorithm will be more effective when combined with the Cipher Block Chaining (CBC) operation mode that is widely used in modern cryptographic algorithms today. The feedback mechanism between the blocks in this mode of operation is the operating advantage. This study describes how to combine the mode of operation of block chaining cipher with triangle chain cipher algorithm so that cipher data login website generated more random and difficult to find its original meaning.

Full Text:

PDF

References


M. S. Dharmawan, Eka Adhitya , Erni Yudaningtyas, “Perlindungan Web pada Login Sistem Menggunakan Algoritma Rijndael,” Univ. Brawijaya, vol. 7, no. 1, pp. 77–84, 2013.

A. Nugroho, Perancangan dan Implementasi Sistem Basis Data, Yogyakarta: Andi, 2011.

T. Zebua and Pritiwanto, “Pembangunan Web Mobile Absensi Mahasiswa Pada Platform Android Yang Terintegrasi Dengan Website Utama Sistem...,”J. Tek. Inform. Unika St. Thomas, vol. 2, no. 1, pp. 100–107, 2017.

Komarudin and A. R. Riswaya, “Sistem Keamanan Web Dengan Menggunakan Kriptografi Message Digest 5/MD5 Pada Koperasi Mitra Sejahtera Bandung,” J. Comput. Bisnis, vol. 7, no. 1, pp. 30–41, 2013.

E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab, Yogyakarta:Andi, 2015.

R. Sadikin, 2012, Kriptografi Untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java, Yogyakarta, Andi.

T. Zebua and E. Ndruru, “PENGAMANAN CITRA DIGITAL BERDASARKAN MODIFIKASI ALGORITMA RC4,” J. Teknol. Infomasi dan Ilmu Komput., vol. 4, no. 4, pp. 275–282, 2017.

M. R. Faqih and E. Ariwibowo, “Visualisasi Algoritma Chiper Block Chaining Sebagai Media Pembelajaran Berbasis Mobile Android,” J. Sarj. Tek. Inform., vol. 2, no. 2, pp. 1381–1390, 2014.

R.K. Hondro and G. W. Nurcahyo, “Analisis dan Perancangan Sistem Yang MenerapkanAlgoritma Triangle Chain Cipher (TCC) UntukEnkripsi Record Tabel Database.” Jurnal Teknologi Informasi dan Komputer, vol.3, no.2. pp. 118-127, 2014.

M. R. Faqih and E. Aribowo,”Visualisasi Algoritma Cipher Block Chaining Sebagai Media Pembelajaran Berbasis Mobile Android”. Jurnal Sarjana Teknik Informatika, vol.2, no.2, pp. 1318-1390, 2014.

T. Zebua, “ANALISA DAN IMPLEMENTASI ALGORITMA TRIANGLE CHAIN PADA PENYANDIAN RECORD DATABASE,” Pelita Inform. Budi Darma, vol. 3, no. 2, pp. 37–49, 2013.

E. Aribowo, “Aplikasi Pengamanan Dokumen Office Dengan Algoritma Kriptografi Kunci Asimetris Elgamal,” J. Inform., vol. 2, no. 2, pp. 209–219, 2008.




DOI: http://dx.doi.org/10.30645/j-sakti.v2i1.51

Refbacks

  • There are currently no refbacks.



J-SAKTI (Jurnal Sains Komputer & Informatika)
Published Papers Indexed/Abstracted By:


Jumlah Kunjungan :

View My Stats