Internet Cafe Billing System Data Security Using RC4 Stream Cipher

2021 ◽  
Vol 12 (02) ◽  
pp. 46-53
Author(s):  
Bobi Akbar

In data communication, against a data security method known as cryptography (Cryptography). Cryptography is a data security method that can be used to maintain data confidentiality, data authenticity or integrity, and the authenticity of the sender. This method is intended so that important information of a limited or confidential nature sent through public telecommunications facilities cannot be known or utilized by unauthorized parties. In this case, data security is also needed at the internet cafe (internet cafe). Warnet which is a place that provides Interconnection Networking that connects computers to form a network system that covers the whole world (global). Each cafe requires a billing system that is used to determine the state of the user in using the facilities at the cafe, starting from how long it takes to use and how much it costs each user. For this reason, so that the data on the billing system cannot be manipulated or modified by unauthorized persons, it is necessary to secure data. The data security method that will be used is cryptography, especially by using the RC4 stream cipher.

Any type of digital information is called as data. In today's world, precarious data are growing and used in communication over internet. Hence, data security is most important factor for the internet users. The best solution is to use some cryptography algorithms which encrypts data in some cipher and transmit it over the internet and again decrypted to genuine data. Cryptography is eternal. The field of cryptography manages the technique for passing on information safely. The objective is to permit the expected recipients to get the message appropriately while interfere with snoopers from understanding the message. Key arrangement layout allows communicating parties to establish a mutual cipher key. The situation of present day of data security framework incorporates secrecy, legitimacy, trustworthiness, non-repudiation. This paper introduces a improved system for securing text-data communication benefiting the use of RSA algorithm. It is the public-key cryptosystem and is mainly used for secure data transmission[1].


2021 ◽  
Vol 6 (2) ◽  
pp. 54-61
Author(s):  
Lekso Budi Handoko ◽  
Andi Danang Krismawan

The increase in significant advances in information technology greatly provides comfort and convenience in managing data. This convenience is what makes people who are not responsible for using it as a crime such as hacking, cracking, phishing, and so on. In Telkom Region 4 Semarang, there is a container where there are important company data such as customer data. Customer data is very important and the contents of the data must be kept confidential. The company has experienced significant losses due to information leakage due to negligence in the last 5 years. For this reason, data security is necessary so that data is safe and is not misused. This study applies the Advance Encryption Standard algorithm - Cipher Block Chaining (AES-CBC) and Stream cipher in order to secure data so as to reduce the risk of data theft by telecom subscribers. Based on the average avalanche effect value of AES-CBC and a stream cipher of 49.34%, this shows that the AES-CBC and Stream Cipher encrypted files are difficult to crack so that data confidentiality is well maintained.


2013 ◽  
Vol 760-762 ◽  
pp. 1241-1243
Author(s):  
Li Zhao ◽  
Yun Zi

The application and development of computer network system bring a great convenience for library management and readers. At the same time, the security of computer network system in library is faced with all kinds of threats. How to guarantee the security of library computer network system has become the most important question for each library. This paper analyzes the factors which affect the library network security, such as network hardware, network operating system and application system, data security and so on, and puts forward corresponding security strategies and solutions.


Author(s):  
Er. Vishal Chauhan ◽  
Dr. Chandresh Parekh ◽  
Prof. Vivek Joshi

Authentication, Authorization, security and confidential information are number of foremost topics part in the Digital cyber - security Area. There are multiple solutions available in this virtualize cyber world that are presented to user’s strength as per digital security. Username and password base are common factor authentication methods. The growing-up popularity with compliance of second factorized methods those driven by the improvement of privacy and security as per the requirement during this digitalization of technological trend. The recognition and success of digital security various measures are big deal to obsessed with simple convenience. Its need more and more implementation for the user privacy, data confidentiality and network security’s system. mainly focus on this research Article into dealing with and analysing the implications of security part of 3FA proposal model for additional security in way of systematic manner to improvements of digital security in web-based Application. This paper will be presenting as web-based Application. so, we can create potentially ensure systems are authorized with authentication of user's assurance without loss of convenience between user-system data communication in network.


2018 ◽  
Vol 2 (1) ◽  
pp. 18-22
Author(s):  
Muhammad Nashrullah ◽  
Muhammad Alif Raher

Utilization of information technology and computer network as data communication media has been increased. The requirement for shared use of existing resources in the network both software and hardware has resulted in the development of various technologies of the network itself. Information technology and communications are widely used today using computer network system as a medium of information and data transformation, the greater the company or agency that uses the network computer the more complex the network system in the company or agency, and required a good handling for the system can run optimally. One of them that uses computer network system is Banyan Tree Bintan. Network monitoring activities in Banyan Tree Bintan are important to do by network administrator to ensure the network is always in good condition. Given the limitations of network administrators who can not always be in the workplace, it is necessary for a system that can monitor the computer network remotely. So that the network administrator can know the state of the computer network at any time and can perform actions that need to be done quickly.This application is based on android using an Internet connection for network administrators can monitor network anytime and anywhere. Desktop-based applications need to be installed on the computer so that computer system data can be retrieved and displayed on android devices.


2020 ◽  
Author(s):  
Dedy Agung Prabowo ◽  
Ujang Juhardi ◽  
Bambang Agus Herlambang

Recently, Information technology develops rapidly. It is possible for us to get some informationquickly, properly and efficiently. The information technology also has many advantages fo r people. Theneed for information is increasing according to the need of its users. This proves that informationtechnology can make our job easier and it can help us to save our time particularly for the job thatrelated to information and data processin g. With the increasing use of computer technology today, italso brings up some problems. One of them is security and confidentiality problem which is animportant aspect in an information system. Data security is an important thing in maintaining theconf identiality of particular data that only can be known by those who have right. RC6 is a symmetrickey algorithm which encrypts 128 bit plaintext blocks to 128 bit ciphertext blocks. The encryptionprocess involves four operations which is the critical arit hmetic operation of this block cipher. As alegal state, Indonesia has issued a regulation in a form of laws governing information and electronictransaction or commonly referred to UU ITE. Besides, Islam is a religion that comprehensively givesthe guidan ce of life for people. Islam has provided guidance in the various fields ranging from social,politics, economics and various other fields.


Author(s):  
S. Gopikrishnan ◽  
P. Priakanth ◽  
Gautam Srivastava ◽  
Giancarlo Fortino

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


Author(s):  
Suryadiputra Liawatimena

The aim of this study is to use Radio Frequency technology to facilitate human activities, especially used in Busway entrances. In this research methodologies used include field survey to the BP Transjakarta; literature study by reading manuals, text books, journals, and articles on the Internet, and conduct laboratory experiments on the Bina Nusantara University Hardware Research Laboratory in designing and making the minimum system . Based on the results of an experiment and taking data on the minimum system, it can be concluded in general the performance of the system is running well, but the response time was not optimal. Some improvements to the system needed to improve system performance, such as raising response time, improved data security, and online systems. 


Sign in / Sign up

Export Citation Format

Share Document