scholarly journals Implementasi Algoritma Kriptografi Playfair Cipher untuk Mengamankan Data Aset

2021 ◽  
Vol 7 (2) ◽  
pp. 109-114
Author(s):  
Galih Agustian Perdana ◽  
Carudin ◽  
Rini Mayasari

Data is very important for humans, data is also needed to collect information. But given that cybercrime crime has occurred in the digital era today. Therefore, data security is very important to be considered. Inside the company has important data. One of the companies in Karawang, namely PT Adyawinsa Stamping Industries, has a data input application that is the company's asset data. Many data crime problems make database systems vulnerable to manipulation. Therefore, the implementation of data security for asset data is implemented using Playfair Cipher cryptography. The Playfair Cipher encrypts letter pairs (bigram or digraph) into letter pairs, not single letters as in other classic ciphers. The purpose of this study is an application that is able to encrypt data using the Playfair Cipher cryptographic algorithm and the application is also capable of performing decryption of data in a database that has been encrypted then entering data that has been encrypted into the database. The results of this study indicate that the system built has successfully performed encryption and decryption of asset data against user names and asset names using the Playfair Cipher cryptographic algorithm. There are differences in the results of the decryption tested in this study. However, the application can set the decryption results with the tools contained in the application.

2018 ◽  
Vol 1 (2) ◽  
pp. 20-28
Author(s):  
Aditya Kurniawan ◽  
Ratna Mayasari ◽  
Muhammad Ary Murti

Data security is one of many problems that we face in IoT implementation. One of the problems with data security is we cannot assure that the data we received in the server-side is truly our data that we send from client-side or sensor-side. With that problems, comes some solutions like encryption and decryption method or some basic authentication planted on the server-side. In this research, we propose some encryption and decryption method that can be easily implemented on both server and sensor-side and then we analyze the complexity of its algorithm. This research aims to create some authentication process for the data that server-side receive from the sensor-side by creating encrypted ID consisting of 6 digits of alphanumeric and useful for identification process in system, so the server can recognize the data and validate it.


2019 ◽  
Vol 3 (2) ◽  
pp. 86-100 ◽  
Author(s):  
Goklas Tomu Simbolon ◽  
Opim Salim Sitompul ◽  
Erna Budhiarti Nababan

Data security is one of the most important aspects of today's information era. Some methods are used to secure important data from hackers. The LSB is a steganographic algorithm that is often used to store data in the last bit. In order to improve the security, we combine steganography with cryptography enables. In this research LSB is modified using the multi-bit LSB model. Modifications are made to the bits of each character, the rotation by a certain amount can randomize the plaintext content before cryptographic algorithm, Vernam is performed. The bit on LSB can be inserted data as much as 1, 2, 3 or 4 - bit information. The calculation results of MSE and PSNR values indicate that the use of 1-bit LSB is superior to that of 2-, 3-, or 4-bit LSB.


2019 ◽  
Vol 12 (2) ◽  
pp. 149-158
Author(s):  
Muhammad Fadlan ◽  
Sinawati Sinawati ◽  
Aida Indriani ◽  
Evi Dianti Bintari

The importance of maintaining data integrity and security is one of the challenges in the current digital era. One method that can be used to face this challenge is through cryptography. In cryptography there are several algorithms that can be used, one of which is the Caesar cipher algorithm. This algorithm has several disadvantages, including a limited number of characters of 26 characters. This can make the encryption results easily recognizable by other parties. This study aims to design a proposal for maintaining data security through cryptographic techniques, while addressing the problems inherent in the Caesar cipher algorithm. The combination of Caesar and Beaufort algorithm is done to overcome the existing problems. In addition, a character list of 94 characters was determined to be used in the process of encryption and decryption of text data. The result, through the integration of these two algorithms, the text cipher becomes more difficult to solve. There are two stages of the encryption process by using two different types of Keys for each stage in securing data


Author(s):  
Diana Diana

This article contains analysis and design of pawnshop database systems and its application design that can be used by PT Langitan Segi Putera for acquiring information about pawn goods, decision making in pawnshop system, how to increase the effectiveness and efficiency of employee performance as well as how to reduce error in data input. The methodology used in this research consists of literature study, survey, and analysis and design. The result obtained is a conceptual, logical and physical database design for pawn process in PT Langitan Segi Putera and its application that is suitable with the design. The design of database and its application meets the company requirement and improves company performance due to the availability of accurate and timely information, improvement in data security, and reduction of data redundancy.


Kilat ◽  
2018 ◽  
Vol 7 (2) ◽  
pp. 91-99
Author(s):  
Yudi Wiharto ◽  
Ari Irawan

Cryptography is important in securing data and information. Confidential, important information may not be publicly or otherwise protected. It is not impossible for anyone to see, damage, steal or misuse important data from an agency or company through a computer network. The solution is with cryptography or a method of data security that can maintain the confidentiality and authenticity of a data or information. This method is intended for confidential information when sent through network access, such as LAN or internet, cannot be utilized by unauthorized parties. Cryptography supports the aspect of information security, namely protection of confidentiality. Therefore the need to maintain the confidentiality of data and information is a cryptographic application. The process in the form of encryption and decryption used by the user to secure the data without changing the contents of the data. This application has a 32-character key but in its use is made into 2 keys, namely public and private key where the public key is the key filled by the user in accordance with the desire, while the private key is the default key entered by the application at random to meet the length of 32 characters. The AES algorithm used is the AES256 algorithm where this algorithm uses the principle with the number of rounds by key.


Author(s):  
Amir Mahmud Hasibuan

Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe. Cryptography supports the needs of two aspects of information security, namely secrecy (protection of the confidentiality of information data) and authenticity (protection against counterfeiting and changing unwanted information). Along with the development of computer technology, the world of information technology requires a stronger and safer cryptographic algorithm. Currently the Advanced Encryption Standard (AES) is used as the latest standard cryptographic algorithm. For this reason, it is necessary to prepare an application that can secure a data and maintain its confidentiality so that it is not known by unauthorized parties. One alternative that can be used in making a data security application is by applying the Advanced Encryption Standard (AES) algorithm. hence the design of a data security application on a smartphone by designing the application of encryption and description of text data using the AES method. This method does a round of 10 rounds to get the results of encryption and decryption in the text.


2018 ◽  
Vol 31 ◽  
pp. 10007 ◽  
Author(s):  
Aryanti Aryanti ◽  
Ikhthison Mekongga

Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


Sign in / Sign up

Export Citation Format

Share Document