ENKRIPSI DATABASE SISTEM INFORMASI HELPDESK DENGAN ALGORITME KRIPTOGRAFI AES-128 DAN VIGENERE CHIPER

  • Muhammad Apit Ruswandi Universitas Budi Luhur
  • Windarto Windarto Universitas Budi Luhur

Abstract

Information technology has benefits to help and make it easier for humans to do everything in sharing communication. During the pandemic, PT. Royal Audrey Megah is one of the companies implementing Work From Home (WFH). To maintain a good quality of support in hosting services, the Customer Service and IT Support division can access helpdesk application through the internet connection. Applications that can be accessed from the internet bring many benefits to their users, even though not spared from their negative impacts. Given this, data is a very valuable asset and must be protected. Data security can be done, one of which is by securing from the database side. Database security can be done by implementing symmetric cryptography Advance Encryption Standard (AES) and Vigenere. The purpose of this study is to minimize the occurrence of database leaks and misuse by irresponsible parties. The cryptographic techniques used are the Advanced Encryption Standard (AES) and vigenere methods. From the results of the implementation, it was concluded that the application is able to secure data in an encrypted database so that it can minimize the occurrence of misuse or manipulation of data by people who do not have authority over the data.

Downloads

Download data is not yet available.

References

[1] A. G. Hanggara, “Jakarta Response to COVID-19 Outbreak: A Timeline,” 2020. https://corona.jakarta.go.id/en/artikel/linimasa-kebijakan-penanganan-pandemi-covid-19-di-jakarta (accessed Jun. 23, 2022).
[2] -, “Apa yang dimaksud dengan pandemi?,” COVID19.GO.ID, 2021. https://covid19.go.id/tanya-jawab?search=Apa yang dimaksud dengan pandemi (accessed Jun. 23, 2022).
[3] D. Widyawan and I. Imelda, “Pengamanan File Menggunakan Kriptografi Dengan Metode AES-128 Berbasis Web di Komite Nasional Keselamatan Transportasi,” Skanika, vol. 4, no. 1, pp. 15–22, 2021, doi: 10.36080/skanika.v4i1.2216.
[4] Basyiah and F. Syahputra, “Perancangan Aplikasi Penyandian Pesan Teks Menggunakan Vigenere Chiper dan Algoritma Elgamal,” MEANS (Media Informasi Analisa dan Sistem), 2018. .
[5] L. Mustika, “Implementasi Algoritma AES Untuk Pengamanan Login dan Data Customer Pada E-Commerce Berbasis Web,” JURIKOM (Jurnal Ris. Komputer), vol. 7, no. 1, p. 148, 2020, doi: 10.30865/jurikom.v7i1.1943.
[6] J. Prayudha, Saniman, and Ishak, “Implementasi Keamanan Data Gaji Karyawan Pada PT. Capella Medan Menggunakan Metode Advanced Encryption Standard (AES),” J. SAINTIKOM (Jurnal Sains Manaj. Inform. dan Komputer), vol. 18, no. 2, p. 119, 2019, doi: 10.53513/jis.v18i2.150.
[7] J. Fruhlinger, “What is cryptography? How algorithms keep information secret and safe,” CSO, 2022. https://www.csoonline.com/article/3583976/what-is-cryptography-how-algorithms-keep-information-secret-and-safe.html (accessed Jun. 23, 2022).
[8] T. Chakraborty, “Unified Modeling Language (UML) | An Introduction,” GeeksForGeeks, 2019. https://www.geeksforgeeks.org/unified-modeling-language-uml-introduction/ (accessed Jun. 23, 2022).
[9] G. J. Simmons, “Vigenère cipher,” Encyclopedia Britannica. https://www.britannica.com/topic/Vigenere-cipher (accessed Jun. 23, 2022).
[10] “Vigenère Table,” Encyclopædia Britannica. https://www.britannica.com/topic/Vigenere-cipher#/media/1/628637/1284 (accessed Jun. 23, 2022).
[11] Federal Information Processing Standards Publication 197, Announcing the ADVANCED ENCRYPTION STANDARD ( AES ). Gaithersburg: National Institute of Standards and Technology, 2001.
[12] N. K. Jharbade and R. Shrivastava, “Network based Security model using Symmetric Key Cryptography (AES 256– Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol),” Int. J. Comput. Sci. Netw. Secur., vol. 12, no. 8, pp. 69–73, 2015.
[13] A. Ansori, “Pengertian Activity Diagram : Tujuan, Simbol, dan Contohnya,” Ansoriweb, 2022. https://www.ansoriweb.com/2020/03/pengertian-activity-diagram.html (accessed Jun. 24, 2022).
[14] J. D. Susatyono, “Teknik Pengujian Black-box Testing dan White-box Testing,” Universitas STEKOM, 2021. http://sistem-komputer-s1.stekom.ac.id/informasi/baca/Teknik-Pengujian-Black-box-Testing-dan-White-box-Testing/38db21cd8ce80834dec740c19b7839738bf026d0 (accessed Jun. 24, 2022).
Published
2022-07-26
How to Cite
[1]
M. Ruswandi and W. Windarto, “ENKRIPSI DATABASE SISTEM INFORMASI HELPDESK DENGAN ALGORITME KRIPTOGRAFI AES-128 DAN VIGENERE CHIPER”, SKANIKA, vol. 5, no. 2, pp. 240-254, Jul. 2022.