IMPLEMENTASI ALGORITME TWOFISH UNTUK MELINDUNGI LAPORAN KEUANGAN BIMBA AIUEO

  • Siswanto Siswanto Universitas Budi Luhur
  • Muhammad Akbar Universitas Budi Luhur
  • Muhammad Anif Universitas Budi Luhur
  • Ari Saputro Universitas Budi Luhur
  • Subandi Subandi Universitas Budi Luhur
  • Basuki Hari Prasetyo Universitas Budi Luhur
Keywords: Twofish Algorithm, Financial Statements, Bimba AIUEO

Abstract

The problem with Bimba AIUEO is that there are frequent changes in financial reports by staff at Bimba AIUEO from both Bimba and Bimbel. The purpose of this research is to build an application to protect Bimba AIUEO's financial statements using the twofish cryptographic algorithm. The results of the application trial showed that the ciphertext that had been encrypted had changed in size by 1.81%, the plaintext that had been decrypted was an accuracy rate of 100% and there was no damage to the contents of the file. The test results of 26 UAT respondents 89.1% agreed that the entire implementation of the twofish algorithm can be used by Bimba AIUEO employees to easily protect financial reports

Downloads

Download data is not yet available.

References

[1] Z. Rahman, T. Hasanuddin, and S. M. Abdullah, ‘Implementasi Metode Enkripsi dan Deskripsi File menggunakan Algoritma Twofish,’ Bul. Sist. Inf. dan Teknol. Islam, vol. 1, no. 2, pp. 66–70, 2020.
[2] S. Siswanto, A. Saputro, G. P. Utama, and B. H. Prasetyo, “Penerapan Algoritma Kriptografi Twofish Untuk Mengamankan Data File,” Bit (Fakultas Teknol. Inf. Univ. Budi Luhur), vol. 18, no. 1, pp. 9–18, 2021.
[3] E. Hasmin, ‘Implementasi Algoritma Twofish Pada Keamanan Data Berbasis Aplikasi Android, Proseding Sensitif 2019, STMIK Dipanegara, pp 407-414, 2019.
[4] Endang C. P., Pengujian UAT (User Acceptance Test). 2017. Tersedia di:https://endangcahyapermana.wordpress.com/2017/03/14/pengujian-uat-user-acceptance-test/, [Accessed 12 Maret 2021].
[5] C. S. Theng, “Leisure Technology for the Elderly: A Survey, User Acceptance Testing and Conceptual Design,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 12, pp. 100–115, 2017.
[6] D. W. Utomo, D. Kurniawan and Y. P. Astuti, ‘Teknik Pengujian Perangkat Lunak Dalam Evaluasi Sistem Layanan Mandiri Pemantauan Haji Pada Kementerian Agama Provinsi Jawa Tengah,’ Jurnal SIMETRIS, vol. 9, no. 2, pp.731–746. 2018.
[7] H. A. Tambunan, J. H. P. Sitorus, ‘Enkripsi dan Dekripsi Dalam Proses Pengiriman Data Dengan Menggunakan Algoritma Twofish,’ vol. 1, no. 1, Jurnal Bisantara Informatika (JBI), pp. 1-17, 2017.
[8] M. Muhathir, ‘Perbandingan Algoritma Blowfish Dan Twofish Untuk Kriptografi File Gambar,’ JITE, vol. 2, no. 1, pp. 23-32, 2018.
[9] F. Khusnul, ‘Implementasi Keamanan Pengiriman Pesan Suara dengan Enkripsi dan Dekripsi Menggunakan Algoritma Twofish,’ Journal of Informatics and Technology, vol. 1, no. 3, pp. 84-89, 2014.
[10] I. Imelda, E. Prawira, ‘Pengamanan Disposisi Dokumen secara online menggunakan Kriptografi Twofish dan Kompresi Huffman pada CV. TMU,’ Seminar Nasional Inovasi dan Aplikasi Teknologi di Industri 2018, ITN Malang, 3 Pebruari 2018, pp, 363-369, 2018.
[11] A. Novianto, V. Sahfitri, and B. Tujni, ‘Penerapan Metode Pengamanan Data Enkripsi dan Deskripsi Menggunakan Metode Twofish Pada PT. Gaya Makmur Tractor,’ Skripsi, Universitas Bina Darma Palembang, pp.1-11, 2020.
[12] Ibrahim M. S., Anggi P. S. dan Wawan G., ‘Aplikasi Enkripsi dan Dekripsi untuk Keamanan Komunikasi Data pada SMS (Short Message Service) Berbasis Android Menggunakan Algoritma Blowfish,’ Jurnal FORMAT, vol. 8, no. 1, pp. 34-41, 2019.
Published
2023-07-26
How to Cite
[1]
S. Siswanto, M. Akbar, M. Anif, A. Saputro, S. Subandi, and B. Prasetyo, “IMPLEMENTASI ALGORITME TWOFISH UNTUK MELINDUNGI LAPORAN KEUANGAN BIMBA AIUEO”, SKANIKA, vol. 6, no. 2, pp. 148-157, Jul. 2023.