DATA SECURITY USING RC6 CIPHER ALGORITHM AS AN IMPLEMENTATION OF PRIVACY PRINCIPLE IN THE UU-ITE PERSPECTIVE AND ISLAMIC LAW

2020 ◽  
Author(s):  
Dedy Agung Prabowo ◽  
Ujang Juhardi ◽  
Bambang Agus Herlambang

Recently, Information technology develops rapidly. It is possible for us to get some informationquickly, properly and efficiently. The information technology also has many advantages fo r people. Theneed for information is increasing according to the need of its users. This proves that informationtechnology can make our job easier and it can help us to save our time particularly for the job thatrelated to information and data processin g. With the increasing use of computer technology today, italso brings up some problems. One of them is security and confidentiality problem which is animportant aspect in an information system. Data security is an important thing in maintaining theconf identiality of particular data that only can be known by those who have right. RC6 is a symmetrickey algorithm which encrypts 128 bit plaintext blocks to 128 bit ciphertext blocks. The encryptionprocess involves four operations which is the critical arit hmetic operation of this block cipher. As alegal state, Indonesia has issued a regulation in a form of laws governing information and electronictransaction or commonly referred to UU ITE. Besides, Islam is a religion that comprehensively givesthe guidan ce of life for people. Islam has provided guidance in the various fields ranging from social,politics, economics and various other fields.

2020 ◽  
Author(s):  
Dedy Agung Prabowo ◽  
Ujang Juhardi ◽  
Bambang Agus Herlambang

Recently, Information technology develops rapidly. It is possible for us to get some informationquickly, properly and efficiently. The information technology also has many advantages fo r people. Theneed for information is increasing according to the need of its users. This proves that informationtechnology can make our job easier and it can help us to save our time particularly for the job thatrelated to information and data processin g. With the increasing use of computer technology today, italso brings up some problems. One of them is security and confidentiality problem which is animportant aspect in an information system. Data security is an important thing in maintaining theconf identiality of particular data that only can be known by those who have right. RC6 is a symmetrickey algorithm which encrypts 128 bit plaintext blocks to 128 bit ciphertext blocks. The encryptionprocess involves four operations which is the critical arit hmetic operation of this block cipher. As alegal state, Indonesia has issued a regulation in a form of laws governing information and electronictransaction or commonly referred to UU ITE. Besides, Islam is a religion that comprehensively givesthe guidan ce of life for people. Islam has provided guidance in the various fields ranging from social,politics, economics and various other fields.


2020 ◽  
Author(s):  
Dedy Agung Prabowo ◽  
Ujang Juhardi ◽  
Bambang Agus Herlambang

Recently, Information technology develops rapidly. It is possible for us to get some informationquickly, properly and efficiently. The information technology also has many advantages fo r people. Theneed for information is increasing according to the need of its users. This proves that informationtechnology can make our job easier and it can help us to save our time particularly for the job thatrelated to information and data processin g. With the increasing use of computer technology today, italso brings up some problems. One of them is security and confidentiality problem which is animportant aspect in an information system. Data security is an important thing in maintaining theconf identiality of particular data that only can be known by those who have right. RC6 is a symmetrickey algorithm which encrypts 128 bit plaintext blocks to 128 bit ciphertext blocks. The encryptionprocess involves four operations which is the critical arit hmetic operation of this block cipher. As alegal state, Indonesia has issued a regulation in a form of laws governing information and electronictransaction or commonly referred to UU ITE. Besides, Islam is a religion that comprehensively givesthe guidan ce of life for people. Islam has provided guidance in the various fields ranging from social,politics, economics and various other fields.


2020 ◽  
Vol 9 (8) ◽  
pp. e307983659
Author(s):  
Taufik Wibowo

The aim of this analysis is referred to several problems which are concerning the Land Administration Service in National Land Agency and Law Aspect of Land Administration Service with the Computerization Information System in BPN Sidoarjo. This research applies the Juridical Normative approach especially in Land Law with the Descriptive and Analytic and qualitative analysis. The result showed that Land Data Management used the information technology which is something that absolutely must be done is related to the characteristics of the land data itself which are multidimensional in nature related to economic, political, defense and security and socio-cultural issues. It can be concluded that information and electronic Transaction, some doubts about the use of electronic land data have found a clarity, especially relating to the electronic documents that are used as a means of proving and electronic data security.


2016 ◽  
Vol 53 (3) ◽  
pp. 74
Author(s):  
Serhiy V. Kozibroda

The problem of creation of the domain knowledge ontology in education of future engineering teachers in branch of Information Technology is considered in the article. The ontology of Information System domain knowledge has been built. This enables to combine a huge amount of existing information into a single knowledge base that combines several disciplines. It has been shown in the process of investigation that Protege OWL programming product is the best for the creation of computer system ontology in preparing future engineering teachers and makes it possible to describe not only concepts, but also specific objects. It is based on a logical model that allows creating definitions of Information System domain knowledge of informal description. The structure and methods of building and using in future the ontology of Information System domain knowledge in the professional activity future engineering teachers in the area of computer technology has been studied.


2020 ◽  
Vol 13 (2) ◽  
pp. 27-36 ◽  
Author(s):  
Ade Supriatna

Rice production and productivity in Subang district must be easily informed by the Department of Agriculture in accordance with advances in information technology and the internet. This study is about data and information that is integrated into a computer-based information system related to the yield of rice crops. The computer-based rice yield report is intended to make it easier to enter data sourced from the corm area online. Then from the user (community) side it will be more practical and easier to get information. And services at the subang agriculture service do not always have to be directly in the office but can be done online. That way the reporting process, fast and structured.Reporting, which was originally still manual, was to recapitulate paper-based transactions and then switch to the application of web-based computer technology and the research method was quantitative.


Author(s):  
Perdana Bagas Tirta Kumbara ◽  
Magdalena A. Ineke Pakereng

Data security is one of the most important factors in the world of Information Technology today. One way to secure data is by Block Cipher Cryptography technique. However, some cryptographic techniques have been successfully solved by the cryptanalysis so that new cryptographic algorithms need to be created. The design of Cryptography algorithms based on traditional game patterns of Rangku Alu from East Nusa Tenggara is a design of Cryptographic Block Cipher algorithms that operate in the form of bits designed with 10 rounds where each cycle contains four processes. In each round there are four patterns for the plaintext process and four patterns for the key. The fourth process is transformed with an S-Box table to get a more random ciphertext. Tests were also carried out using Avalance Effect which reached 49,38% and the correlation value where there was a change in character reached 73,44%. So the result designing Cryptographic algorithms can be used for encryption and description in text files.


Author(s):  
Naufal Fauzi Rahman

The development of information technology that is very fast and unpredictable is an important thing to pay attention to and also to be generally used and better in daily use. The immigration information technology in its implementation which uses an application called SIMKIM or the Immigration Management Information System. Immigration monitoring activities require the assistance of the SIMKIM application which is the main topic of this qualitative research which results in several conclusions including that the SIMKIM application has an important role in the implementation of immigration supervision, but the SIMKIM application can still be developed better in order to advance the Immigration agency even better.  


JURTEKSI ◽  
2017 ◽  
Vol 4 (1) ◽  
pp. 29-36
Author(s):  
Dewi Anggraeni

Abstract: Utilization of computer technology in data processing processing of Balai Pengelolaan Daerah Aliran Sungai in BPDAS Kota Padang still no. All still done manually so that in making the report requires precision and a long time. Therefore, the researcher builds a watershed management information system in BPDAS Kota Padang using Visual BasicNet 2012 programming language. By utilizing computerized system is expected to assist the processing of data management of watersheds in BPDAS Padang so that it can produce fast information , precise and accurate. Keywords: information system, data processing, Balai Pengelolaan Daerah Aliran Sungai Abstrak: Pemanfaatan teknologi komputer dalam proses pengolahan data balai pengelolaan daerah aliran sungai di BPDAS Kota Padang masih belum ada. Semua masih dilakukan secara manual sehingga dalam pembuatan laporan membutuhkan ketelitian dan waktu yang cukup lama. Oleh sebab itu, peneliti membangun suatu sistem informasi pengelolaan daerah aliran sungai di BPDAS Kota Padang dengan menggunakan bahasa pemrograman Visual Basic Net 2012. Dengan memanfaatkan sistem komputerisasi diharapkan dapat membantu proses pengolahan data pengelolaan daerah aliran sungai di BPDAS Kota Padang sehingga dapat menghasilkan informasi yang cepat, tepat dan akurat. Kata kunci: sistem informasi, pengolahan data, Balai Pengelolaan Daerah Aliran Sungai


2020 ◽  
Vol 1 (1) ◽  
pp. 78-85
Author(s):  
Tasha Amaraesty

The development of information technology has changed the world to become easier and bring development and progress in all fields. With the support of computer technology it is proven that the mechanism of long and repetitive work becomes effective and efficient. Information systems play an important role in supporting the smooth work activities in an information, how to organize data with a database system that has been supporting the performance of many agencies. Writing Purpose This would like to know how much influence an information system is implemented in a company and what are the strengths and weaknesses arising from the application of an information system in a traveloka company. This writing uses a qualitative method with literauture studies in the field of Scientific Information Systems and Information Technology (IT). Information is obtained from the artiker, module and the internet. Besides that, based on empirical experience and direct observation on the object of research.  


2021 ◽  
Vol 5 (2) ◽  
pp. 167
Author(s):  
Mochamad Alfan Rosid ◽  
Sumarno Sumarno

This research aims to create a student presence system using the QR Code (Quick Response Code) with AES encryption, when the learning process will begin, lecturers display QR Code for further scans by students through their smartphones that have been installed academic information system, data presences will be automatically stored in the database, the data can be known directly by lecturers and students. Data security uses AES encryption methods and in order to ensure that students are actually present then this research also implements Geolocation, if Geolocation on the student's smartphone is not the same as that in the presences system then the student is not able to perform the presences. From the results of the research, the system can run well, with the existence of this system can simplify the process of presences and increase efficiency because no more presences printed on paper.


Sign in / Sign up

Export Citation Format

Share Document