Data Security System for A Bank Based on Two Different Asymmetric Algorithms Cryptography

Author(s):  
Md. Ashiqul Islam ◽  
Aysha Akter Kobita ◽  
Md. Sagar Hossen ◽  
Laila Sultana Rumi ◽  
Rafat Karim ◽  
...  
2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


2000 ◽  
Vol 6 (1_suppl) ◽  
pp. 160-161 ◽  
Author(s):  
Peter Sögner ◽  
Klaus Goidinger ◽  
Dietmar Reiter ◽  
Alfons Stoeger ◽  
Dieter Zur Nedden

We assessed a data security system using biometric fingerprint techniques and smartcards to control access to a teleradiology system. Clinical cases were initially discussed between the referring physician and radiologist in Tyrol using a video-phone. Subsequent correspondence, including the transmission of images between the referring physician and the radiologist, was carried out by email using the security system to prevent unauthorized access to patient information. Seventy-eight teleradiology sessions were conducted using this data security system. Speed and stability of data exchange were unaffected by the additional security feature. The average log-on time to the system was 7.8 s. The average training time on how to use the system was 15 min. The radiologist was able to issue a final patient report using the system within 1.5 of the initial contact. The data security feature was user-friendly and did not hinder the normal teleradiology consultation.


2021 ◽  
Vol 15 (2) ◽  
pp. 65-75
Author(s):  
Maulyanda Az ◽  
Syafrial Fachri Pane ◽  
Rolly Maulana Awangga

Abstrak Penelitian ini membantu dalam melalukan proses Keamanan data atau informasi untuk menjamin kerahasiaan dan keaslian data atau informasi. Dalam perancangan ini menggunakan Kriptografi sebagai salah satu solusi dalam mengamankan data atau informasi. Metode kriptografi digunakan untuk mempersatukan algoritma Md5, Base64 serta AES (Advanced Encryption Standard). Kombinasi dari tiga algoritma menghasilkan ciphertext, yang dapat mengamankan data dari proses tag NFC. Penelitian ini menggunakan metodologi penelitian yang dapat menyatakan bahwa sistem yang dibangun dapat berfungsi dengan baik dan untuk keamanan nya aman digunakan, dari hasil penerapannya didapatkan hasil persentase keberhasilan 100%. Jadi, penelitian ini mampu menjawab permasalahan yang terjadi pada sistem keamanan data. Abstract This research helps in carrying out data or information security to ensure the confidentiality and authenticity of data or information. This design uses Cryptography as a solution in securing data or information. Cryptographic methods to unify the Md5, Base64, and AES (Advanced Encryption Standard) algorithms. The combination of the three algorithms produces ciphertext, which can secure data from the NFC tag process. This study uses a research methodology that can state that the system built can function correctly, and for security, it is safe to use because it has a 100% success percentage. So, this researchable to answer the problems that occur in the data security system.


Compiler ◽  
2014 ◽  
Vol 3 (1) ◽  
Author(s):  
Muttaqin Muttaqin ◽  
Haruno Sajati ◽  
Nurcahyani Dewi Retnowati

Chatting application is an application which used for communication through local network or internet. It can use to make communication to be effective and easy to use but there are several shortage in delivery information process is data security when communication is going on. Using chrypthography with modification Rivest Shamir adleman (RSA) algorithm in encryption process and decryption on packet data which transmited is one of security system which can used in this application then the security of data packet secured. Result from implementation of chatting application which apply chrypthography with modification Rivest Shamir adleman (RSA) algorithm have done in local network and internet able to run smoothly and have done by several testing cases based on certain scenario.  Whereas process testing encryption  and decryption using tools wireshark.


Instruksional ◽  
2020 ◽  
Vol 2 (1) ◽  
pp. 35
Author(s):  
Sulfikar - Sallu ◽  
Qammaddin Qammaddin

Data security is a process in maintaining and securing information packages in exchanging data in the digital world. The purpose of this study is to produce a method for securing online data transactions. The method used is a literature review by comparing several data security methods that already exist in online learning. The results achieved are a method or method that can be used in online learning for computer network courses. The implication is that the Computer Network course given online will have an online data security system in the teaching and learning process.


Author(s):  
Oluwafemi Osho ◽  
Farouk A. Musa ◽  
Sanjay Misra ◽  
Andrew A. Uduimoh ◽  
Adewole Adewunmi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document