Implementasi Revest Code 4 (RC4) Untuk Data Resep Obat Di RSUP H.Adam Malik

Jaka Prayudha(1*), Oris Krianto Sulaiman(2), Ita Mariami(3), Jufri Halim(4),

(1) STMIK Triguna Dharma
(2) Universitas Islam Sumatera Utara
(3) STMIK Triguna Dharma
(4) STMIK Triguna Dharma
(*) Corresponding Author

Abstract


Advances in technology will run in accordance with advances in science which will get information easily and quickly. This is supported by information and communication technology which is growing rapidly from year to year. An example is in the management of drug data which is considered very important at H. Adam Malik Hospital. Where the possibility of falsification of drug data and not according to the availability of the number and type according to the needs due to the weakness of the system used. Seeing the existing problems is a consideration for choosing a cryptographic algorithm. Cryptography is based on an information coding algorithm that supports the needs of two aspects of information security, namely the protection of the confidentiality of information data and the protection against falsification of information. Rivest Code 4 (RC4) is one of the methods used to encode text messages in securing drug redemption data for research at H.Adam Malik Hospital. Implementation of Cryptography Implementation in Encoding Drug Redemption Data at H. Adam Malik Hospital Using the Rivest Code 4 (RC4) Method, carried out in two processes, namely the encryption process and the decryption process on the drug redemption data, where the original data (plaintext) entered can be encrypted into encoded data (ciphertext) and can be returned to the original data back as before with the decryption process.

Full Text:

PDF

References


I. S. Sabana and L. Tanti, “Pengembangan Model Keamanan Data Inventory Dengan,” J. FTIK, vol. 1, no. 1, pp. 607–618, 2020.

N. Tanjung, “Perancangan Sistem Informasi Data Rekam Medis Pasien Rawat Jalan Pada Klinik Utama Al-Basyariah Citayam,” JITK (Jurnal Ilmu Pengetah. dan Teknol. Komputer), vol. 4, no. 1, pp. 119–124, 2018, [Online]. Available: http://ejournal.nusamandiri.ac.id/index.php/jitk/article/view/454/400.

G. Ammary and S. Mulyati, “Aplikasi Kriptografi Untuk Keamanan Databse Dengan Metode Rc4 Dan Elgamal Berbasis Web Pada Jxl Design Co,” Skanika, vol. 1, no. 2, pp. 815–820, 2018.

W. H. Haji and S. Mulyono, “Implementasi Rc4 Stream Cipher Untuk Keamanan Basis Data,” Implementasi Rc4 Stream Cipher Untuk Keamanan Basis Data, vol. 2012, no. Snati, pp. 15–16, 2012, [Online]. Available: e-mail:wahyuhari@gmail.com,slamet_mulyono@yahoo.com.




DOI: https://doi.org/10.30645/kesatria.v2i3.79

DOI (PDF): https://doi.org/10.30645/kesatria.v2i3.79.g79

Refbacks

  • There are currently no refbacks.


Published Papers Indexed/Abstracted By: