Implementasi Algoritma Data Encryption Standard Pada Penyandian Record Database

Neti Rusri Yanti(1*), Alimah Alimah(2), Desi Afrida Ritonga(3),

(1) STMIK Budidarma Medan
(2) STMIK Budidarma Medan
(3) STMIK Budidarma Medan
(*) Corresponding Author

Abstract


Record databases are generally still often displayed in text form as information for users, so it can facilitate cryptanalyst to access and provide opportunities to do the leak, distribute or modify the database records. One of the cryptographic algorithms used to secure data is using the DES algorithm to encrypt the data to be stored or sent. The DES algorithm belongs to a cryptographic system of symmetry and is a type of block cipher. DES operates on a 64-bit block size. DES describes 64 bits of plaintext to 64 bits of ciphertext using 56 bits of internal key (internal key) or up-key (subkey). The internal key is generated from an external key 64-bit length. This research describes the process of securing database records by encrypting it based on DES algorithm, resulting in text record databases in the form of passwords that are difficult to understand and understand by others. This is done in an attempt to minimize the misuse of database records.


Full Text:

PDF

References


S.H. Suryawan, Hamdani, "Pengamanan Data File Dengan Menggunakan Algoritma Enkripsi Rivest Code 5 ," Jurnal Informatika Mulawarman , vol. Vol. 8, No. 2 , pp. 44-49, 2013.

E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab, Yogyakarta:Andi, 2015.

T. Zebua and E. Ndruru, “PENGAMANAN CITRA DIGITAL BERDASARKAN MODIFIKASI ALGORITMA RC4,” J. Teknol. Infomasi dan Ilmu Komput., vol. 4, no. 4, pp. 275–282, 2017.

E. Setyaningsih, “Penyandian Citra Menggunakan Metode Playfair Cipher”,J. Teknol., vol. 2, no. 2, pp. 213–219, 2009.

Hamdani, S.H. Suryawan, A. Septiarini,"Pengujian Algoritma Rivest Code 5 Untuk Enkripsi Struktur File Dokumen," Jurnal Informatika Mulawarman, vol. Vol. 8 No. 2, pp. 44-49, Juni 2013.

E. Aribowo, “Aplikasi Pengamanan Dokumen Office Dengan Algoritma Kriptografi Kunci Asimetris Elgamal,” J. Inform., vol. 2, no. 2, pp. 209–219, 2008.

Rifki Sadikin, Kriptografi Untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java, Yogyakarta: Andi, 2012.

H. Pandiangan and S. Sijabat "PERANCANGAN MEDIA PENGIRIMAN PESAN TEKS DENGAN PENYANDIAN PESAN MENGGUNAKAN ALGORITMA RC4 BERBASIS WEB ," Jurnal Matik Penusa , vol. Volume XIX, No. 1 , no. ISSN 2088-3943 , pp. 63-71, Juni 2016

T. Zebua, “ANALISA DAN IMPLEMENTASI ALGORITMA TRIANGLE CHAIN PADA PENYANDIAN RECORD DATABASE,” Pelita Inform. Budi Darma, vol. 3, no. 2, pp. 37–49, 2013.

N. Widyastuti, “Pengembangan Metode Beaufort Cipher Menggunakan Pembangkit Kunci Chaos,” J. Teknol., vol. 7, no. 1, pp. 73–82, 2014.

U. R. S. Lubis, Mesran, and T. Zebua, “Implementasi Algoritma Chua Chaotic Noise Pada Enkripsi Citra RGB,” in KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), 2017, vol. I, no. 1, pp. 220–224.




DOI: http://dx.doi.org/10.30645/j-sakti.v2i1.53

Refbacks

  • There are currently no refbacks.



J-SAKTI (Jurnal Sains Komputer & Informatika)
Published Papers Indexed/Abstracted By:


Jumlah Kunjungan :

View My Stats