IMPLEMENTASI KRIPTOGRAFI MENGGUNAKAN METODE BLOWFISH DAN BASE64 UNTUK MENGAMANKAN DATABASE INFORMASI AKADEMIK PADA KAMPUS AKADEMI TELEKOMUNIKASI BOGOR BERBASIS WEB-BASED

##plugins.themes.academic_pro.article.main##

Annas Rifa’i
Lilis Cucu Sumartini

Abstract

Data is a very authentic evidence that need to be saved because the data are at risk of data changes by the party who wanted to misuse the data or no effect on the data. Therefore, so that no unauthorized person to change the existing data, stored or can take the data that is very important, we need a method to be able to secure and keep data. The database is used to keep data and information. The whole system stores the data in the database, so that the contents of stored data security and confidentiality must be maintained. To maintain the security of a security that is required cryptography. With the use of databases that are in can be connected to each other, Database is not just a place to store data,Computer security system is needed at this time in line with the increase use of computers in the world. So existing data security has become seriously threatened to be accessed by people who are not responsible. Computer security becomes very important at this time because it is related to the privacy, integrity, authentication and confidentiality. Thus data need to be stored by using the correct storage techniques, so that the confidentiality and security of data is maintained. Cryptographic techniques with engineering data encryption on the database is one solution that can be used to meet the confidentiality and Data Security settings. With the existence of a cryptography that includes the encryption process, the data in the database can be encoded so that unauthorized persons can not read the information, in addition to those who know the key to describing it. Security of data / information document with a cryptographic technique that uses the Blowfish algorithm chosen method for cryptographic key modernmerupakan shaped symmetric block cipher. Blowfish algorithm which can encrypt text built in text form. Encryption is done using a specific key, resulting ciphertext that can not be understood. The ciphertext can be changed back as the beginning if the decryption using the same key in the beginning when the database mengekripsi.

##plugins.themes.academic_pro.article.details##

How to Cite
Rifa’iA., & Sumartini, L. C. (2019). IMPLEMENTASI KRIPTOGRAFI MENGGUNAKAN METODE BLOWFISH DAN BASE64 UNTUK MENGAMANKAN DATABASE INFORMASI AKADEMIK PADA KAMPUS AKADEMI TELEKOMUNIKASI BOGOR BERBASIS WEB-BASED. Jurnal E-Komtek (Elektro-Komputer-Teknik), 3(2), 87 - 96. https://doi.org/10.37339/e-komtek.v3i2.133

References

Siswo, W., Rian, F., and Zaldi, I. (2015) ‘Aplikasi Teknik Enkripsi Dan Dekripsi File Menggunakan Algoritma Blowfish Dengan Perangkat Ponsel Mobile Berbasis Android’, SETRUM, Vol. 3, No. 1.

Ahmad, S., Erwin, G., and Asep, S. (2012) ‘Mengamankan Skrip Pada Bahasa Pemograman PHP Dengan Menggunakan Kriptografi Base64’. Retrieved September, 2012, Garut: Sekolah Tinggi Teknologi Garut.

Mohamad, N. (2017). ‘Pengembangan Prototype Sistem Kriptografi Untuk Enkripsi Dan Dekripsi Data Office Dengan Menggunakan Metode Blowfish Dengan Bahasa Pemograman Java’. Jurnal Format. Vol. 6, No. 1.

Aziz, N., and Erwin, G. (2017) ‘Penerapan Kriptografi Base64 Untuk Keamanan URL (Uniform Resource Locator) Website Dari Serangan SQL Injection’, Jurnal Algoritma, Vol. 13, No.1.

Tetuko, N., and Anita, Q. (2014) ‘Rancang Bangun Aplikasi Enkripsi Database Mysql Dengan Algoritma Blowfish’, Jurnal Online, Vol. 2, No. 1.

Rio, H. (2011) ‘Implementasi Algoritma RSA Dan Blowfish Untuk Enkripsi Dan Deskripsi Data Menggunakan Delphi 7’, Skripsi.

Mohammad, K. (2012) ‘Implementasi Sistem Enkripsi Pengiriman Pesan Instan Java Dengan Algoritma Blowfish’, Skripsi.

Donzilo, M. (2018) ‘Perbandingan Algoritma DES,AES,IDEA, Dan Blowfish Dalam Enkripsi Dan Dekripsi Data’, Jurnal Teknologi Terpadu, Vol. 4, No. 1.

Chandra, P., end Banni, A. (2016) ‘Sistem Informasi Manajemen Pengarsipan Dengan Menggunakan Algoritma Blowfish’, Jurnal Online, Teknik Elektro, Politeknik Negeri Malang, Vol. 2, No. 2.

Ady, W., Mujito., end Singgih, S. (2017) ‘Implementasi Algoritma Kriptografi Blowfish, Standar.