Penerapan Algoritma RC4 Dan Rail Fence Untuk Enkripsi Database Mahasiswa Pada Kampus Poltekkes Kemenkes Medan

  • Rananda Satia Siregar Fakultas Teknik Informatika Universitas Harapan Medan
  • Munjiat Setiani Asih UNIVERSITAS HARAPAN MEDAN
  • Nur Wulan UNIVERSITAS HARAPAN MEDAN

Abstract

At this time every institution has implemented a system login in data processing applications, especially the Poltekkes Kemenkes Medan. The login system is not enough to maintain data security. If an irresponsible person successfully to enter the database on local server (locahost), then the person has succeeded in knowing the contents of the database, this can certainly be detrimental to the Poltekkes Kemenkes Medan, because the data contained in the database can be misused. Therefore it is necessary to increase the security of data in the database. In this research an increase database security will be done with encryption techniques, encryption will be done using the algorithm RC4 and Rail Fence. RC4 is a symmetric algorithm, in which the encryption and decryption process uses the same key, and is performed on each byte bybinary xor operations. While Rail Fence is a symmetrical algorithm with transposition techniques with zig-zag patterns. The combination of these two algorithms will produce ciphertext which is difficult to solve so that it becomes stronger.

References

[1] D. Ariyus, Pengantar Ilmu Kriptografi: Teori Analisis dan Implementasi. Yogyakarta: ANDI OFFSET, 2008.
[2] R. K. Hondro, “Aplikasi Enkripsi Dan Dekripsi SMS Dengan Algoritma Zig Zag Cipher Pada Mobile Phone Berbasis Android,” Pelita Inform. Budi Darma, vol. 10, no. 3, 2015.
[3] T. Zebua and E. Ndruru, “Pengamanan Citra DIgital Berdasarkan Modifikasi Algoritma RC4,” J. Teknol. Inf. dan Ilmu Komput., vol. 4, no. 4, pp. 275–282, 2017.
[4] H. Pandiangan and S. Sijabat, “Perancangan Media Pengiriman Pesan Teks Dengan Penyandian Pesan Menggunakan Algoritma RC4 Berbasis WEB,” J. Matik Penusa, vol. 19, no. 1, pp. 63–71, 2016
[1] D. Ariyus, Pengantar Ilmu Kriptografi: Teori Analisis dan Implementasi. Yogyakarta: ANDI OFFSET, 2008.
[2] R. K. Hondro, “Aplikasi Enkripsi Dan Dekripsi SMS Dengan Algoritma Zig Zag Cipher Pada Mobile Phone Berbasis Android,” Pelita Inform. Budi Darma, vol. 10, no. 3, 2015.
[3] T. Zebua and E. Ndruru, “Pengamanan Citra DIgital Berdasarkan Modifikasi Algoritma RC4,” J. Teknol. Inf. dan Ilmu Komput., vol. 4, no. 4, pp. 275–282, 2017.
[4] H. Pandiangan and S. Sijabat, “Perancangan Media Pengiriman Pesan Teks Dengan Penyandian Pesan Menggunakan Algoritma RC4 Berbasis WEB,” J. Matik Penusa, vol. 19, no. 1, pp. 63–71, 2016.
[5] Nurhardian and A. Pudoli, “Implementasi Keamanan File dengan Kompresi Huffman dan Kriptografi menggunakan Algoritma RC4 serta Steganografi menggunakan End of File Berbasis Desktop pada SMK Negeri 3 Kota Tangerang,” J. TICOM, vol. 5, no. 1, pp. 39–46, 2016.
[6] A. Hariati, K. Hardiyanti, and W. E. Putri, “Kombinasi Algoritma Playfair Cipher Dengan Metode Zig-zag Dalam Penyandian Teks,” J. Penelit. Tek. Inform., vol. 2, no. 2, pp. 13–17, 2018.
Published
2019-11-04