scholarly journals Kerahasiaan Teks Basis Data MySQL Menggunakan Algoritma Elgamal

2019 ◽  
Vol 1 (4) ◽  
pp. 65-71
Author(s):  
Niko Surya Atmaja

The common method used to secure a MySQL database is in access control. The technique is the use of a password. To better secure the data sent cryptographic techniques need to be done. This study uses the Elgamal method in conducting cryptography. The results of this study generate MySQL databases in random form during safer delivery and can only be accessed by parties who have a password. So this research can further improve MySQL data security

Author(s):  
Niko Surya Atmaja ◽  
S Sumijan ◽  
Y Yuhandri

The common method used to secure a MySQL database is in access control. The technique is the use of a password. To better secure the data sent cryptographic techniques need to be done. This study uses the Elgamal method in conducting cryptography. The results of this study generate MySQL databases in random form during safer delivery and can only be accessed by parties who have a password. So this research can further improve MySQL data security


Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


2021 ◽  
Vol 1022 ◽  
pp. 1-6
Author(s):  
Victoria S. Romanova ◽  
Viktor V. Gabov

The article addresses the features of rock disintegration based on the principles of selective and preferential destruction in high-frequency cone vibratory crushers with a free-turning inner cone. Based on the common method for determining the ultimate strength of rocks, a method for investigating the process of ore destruction under repeated and versatile influences has been proposed depending on the structure of the crushed material. The results of an experimental research of the destruction of rock samples on a press with limited force are given.


2021 ◽  
Vol 5 (6) ◽  
pp. 1113-1119
Author(s):  
Muhammad Fadlan ◽  
Haryansyah ◽  
Rosmini

One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly used, namely substitution techniques and transposition techniques. One of the weaknesses of the basic cryptographic techniques is the lower level of data security. This study proposed a super encryption model in securing data by combining cryptographic algorithms with substitution techniques, i.e., autokey cipher and transposition, i.e., columnar transposition cipher. This study used the Avalanche Effect method as a measurement tool for the proposed super encryption model. The test results have shown that the proposed super encryption model can provide a better level of security. The avalanche effect test on the five data test shows that the average AE value of the proposed super encryption model is 30.76%. This value is higher than the single autokey cipher algorithm of 1.66% and column transposition with a value of 18.03%. Other results from the five data test have shown that the proposed model has a high level of accuracy of 100% in terms of the decryption process results, which is the same as the initial data before going through the encryption process.  


2019 ◽  
Vol 1237 ◽  
pp. 022010
Author(s):  
Yonggui Guo ◽  
Lina Cao ◽  
Xiao Gao ◽  
Xuming Lv
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document