Kombinasi algoritma base64 dan caesar cipher pada aplikasi

Yudo Devianto(1), Wawan Gunawan(2*), Bambang Sukowo(3), Susafaati Susafaati(4)

(1) Universitas Mercu Buana
(2) Universitas Mercu Buana
(3) Universitas Mercu Buana
(4) Universitas Nusa Mandiri
(*) Corresponding Author

Abstract


Digital information systems must also pay attention to data security because it is confidential, there are many problems with data security which result in loss of data or damage caused by irresponsible parties. This research will combine the BASE64 and CAESAR CIPHER algorithms in applications to maintain the security of financial data so that it cannot be seen by users who do not have access to the application. The system development in this research looks like in Figure 1 which uses the Extreme Programming method. The testing carried out was using Black box and white box testing which produced the same cyclomatic complexity value, namely 4. So it can be concluded that the system is running well because the testing produces the same value

Full Text:

PDF (Indonesian)

References


H. T. S. Alrikabi and H. T. Hazim, “Enhanced Data Security of Communication System Using Combined Encryption and Steganography,” Int. J. Interact. Mob. Technol., vol. 15, no. 16, pp. 144–157, 2021, doi: 10.3991/ijim.v15i16.24557.

J. Zhu et al., “Enabling rack-scale confidential computing using heterogeneous trusted execution environment,” Proc. - IEEE Symp. Secur. Priv., vol. 2020-May, pp. 1450–1465, 2020, doi: 10.1109/SP40000.2020.00054.

C. Sharma, S. . Jain, and A. K. Sharma, “Explorative Study of SQL Injection Attacks and Mechanisms to Secure Web Application Database- A Review,” Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 3, pp. 79–87, 2016, doi: 10.14569/ijacsa.2016.070312.

R. Stofberg, C. M. Mabaso, and M. H. R. Bussin, “Employee responses to pay transparency,” SA J. Ind. Psychol., vol. 48, pp. 1–12, 2022, doi: 10.4102/sajip.v48i0.1906.

W. Przychodzen and F. Gómez-Bezares, “CEO–Employee Pay Gap, Productivity and Value Creation,” J. Risk Financ. Manag., vol. 14, no. 5, 2021, doi: 10.3390/jrfm14050196.

R. Aulia, A. Zakir, and D. A. Purwanto, “Penerapan Kombinasi Algoritma Base64 Dan Rot47 Untuk Enkripsi Database Pasien Rumah Sakit Jiwa Prof. Dr. Muhammad Ildrem,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 2, no. 2, pp. 146–151, 2018, doi: 10.30743/infotekjar.v2i2.300.

C. Wadisman, I. Nozomi, and S. Rahmawati, “PENGAMANAN DATABASE MENGGUNAKAN KOMBINASI ALGORITMA (CEST CRYPTOGRAPHY) DAN ALGORiTMA BASE64,” JURTEKSI (Jurnal Teknol. dan Sist. Informasi), vol. 7, no. 1, pp. 33–38, 2020, doi: 10.33330/jurteksi.v7i1.896.

E. Setyaningsih, “Keamanan file dokumen menggunakan algoritme Advanced Encryption Standard pada aplikasi berbasis Android,” Jnanaloka, pp. 11–23, 2020, doi: 10.36802/jnanaloka.2020.v1-no1-13.

P. Studi Teknik, K. Kunci, and P. Korespondensi, “Aplikasi Perpaduan Enkripsi Base64 Dengan Metode Steganografi Distrete Cosine Transform (Dct),” J. Sintaks Log., vol. 2, no. 2, pp. 37–45, 2022.




DOI: http://dx.doi.org/10.30998/faktorexacta.v17i1.20680

Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

template doaj grammarly tools mendeley crossref SINTA sinta faktor exacta   Garuda Garuda Garuda Garuda Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Flag Counter

site
stats View Faktor Exacta Stats


pkp index