Implementation Combination Cryptographic Algorithm Triangle Chain Cipher and Vigenere Cipher In Securing Data in Database

Authors

  • Ahmad Arif Universitas Harapan Medan
  • Adidtya Perdana Universitas Harapan Medan
  • Arief Budiman Universitas Harapan Medan

DOI:

10.33395/sinkron.v7i1.11236

Keywords:

Kriptografi, Vigenere Cipher, Triangle Chain Cipher, Database

Abstract

Data security is most important today, because the rampant data theft resulting in a lot of misuse of data by irresponsible parties so that it makes us anxious as data owners, for data storage it is usually stored in the database. From these problems the idea emerged to create a cryptographic system where the system can secure data by encrypting and decrypting also make data fully save and then the data owned by the user. This study aims to secure the data in the database by encrypting the original data without destroying the original data when later after decrypted. To perform this security, a cryptographic methodology is used with both of  method that is Vigenere Cipher and Triangle Chain Cipher algorithms which are implemented in the application because both of methodology have same root that is classical cryptographic. This application will later be used as a medium for users to secure their data in the database so that later data theft will not to be easy. After doing fully research that produces applications that can implement combination of Vigenere Cipher and Triangle Chain Cipher algorithms,data in the encrypted database field is safe because encryption has been done to the data.

GS Cited Analysis

Downloads

Download data is not yet available.

References

Alasi, T. S., Al, A. T., & Siahaan, A. (2020). Algoritma Vigenere Cipher Untuk Penyandian Record Informasi Pada Database. Jurnal Informasi Komputer Logika, 1(4). http://ojs.logika.ac.id/index.php/jikl

Alhogbi, B. G. (2017). Bab Ii Tinjauan Pustaka Dan Landasan Teori. Journal of Chemical Information and Modeling, 53(9), 21–25. http://www.elsevier.com/locate/scp

Dakhi, O., Masril, M., Novalinda, R., Jufrinaldi, J., & Ambiyar, A. (2020). Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Cipher. INVOTEK: Jurnal Inovasi Vokasional Dan Teknologi, 20(1), 27–36. https://doi.org/10.24036/invotek.v20i1.647

Eka Putra, A. (2021). (2021). Perancangan dan Pengembangan Basis Data Tidak Terstruktur untuk Aplikasi Sentiment Analysis Twitter dan Instagram Bahasa Indonesia. 6–30.

FAJRIN, R. (2017). Pengembangan Sistem Informasi Geografis Berbasis Node.JS untuk Pemetaan Mesin dan Tracking Engineer dengan Pemanfaatan Geolocation pada PT IBM Indonesia. Jurnal Informatika, 11(2), 33–40. https://doi.org/10.26555/jifo.v11i2.a6090

Irawan, Y. (2020). Implementasi algoritma triangle chain cipher dalam penyandian pesan. KAKIFIKOM : Kumpulan Artikel Karya Ilmiah Fakultas Ilmu Komputer, 02(02), 83–92.

Ismail, T., Informatika, U. I., Email, P., & Klasik, A. K. (2021). Sistem keamanan pesan email menggunakan algoritma kriptografi klasik. 4(April), 47–57.

Istiono, W., Hijrah, & Sutarya. (2016). Pengembangan Sistem Aplikasi Penilaian dengan Pendekatan MVC dan Menggunakan Bahasa PHP dengan Framework Codeigniter dan Database MYSQL pada Pahoa College Indonesia. Jurnal TICOM (Online), 5(1), 53–59. https://media.neliti.com/media/publications/93757-ID-pengembangan-sistem-aplikasi-penilaian-d.pdf

Juliadi, Prihandono, B., & Kusumastuti, N. (2013). Kriptografi Klasik Dengan Metode Modifikasi Affine Cipher Yang Diperkuatdenganvigenere Cipher. Buletin Ilmiah Mat. Stat. Dan Terapannya (Bimaster), 02(2), 87–92.

Nurdin, A. P. N. (2017). Analisa Dan Implementasi Kriptografi Pada Pesan Rahasia. Jesik, 3(1), 1–11. nnurdin69@gmail.com

Pahlevi, O., Mulyani, A., & Khoir, M. (2018). Sistem Informasi Inventori Barang Menggunakan Metode Object Oriented Di Pt. Livaza Teknologi Indonesia Jakarta. Jurnal PROSISKO, 5(1). https://livaza.com/.

Roni, M. R. A. (2019). SISTEM INFORMASI E-COMMERCE PEMESANAN INTERIOR RUMAH DI ALFARUQ INTERIOR DENGAN MENGGUNAKAN METODE RAPID APPLICATION DEVELOPMENT (RAD). Angewandte Chemie International Edition, 6(11), 951–952., 2015, 7–24.

Setyawati, E., Widjayanti, C. E., Siraiz, R. R., & Wijoyo, H. (2021). Pengujian keamanan komputer kriptografi pada surat elektronik berbasis website dengan enkripsi metode MD5. Jurnal Manajamen Informatika Jayakarta, 1(1), 56. https://doi.org/10.52362/jmijayakarta.v1i1.367

Tarigan, E., & Maha, D. H. S. (2018). Kombinasi Vigenere Cipher Dan Polyalphabetic Cipher Pada Pengamanan File Text. Publikasi Ilmiah …, 71–77. http://jurnalnya.stmikneumann.ac.id/index.php/pitin/article/view/41

Yusfrizal, Y. (2019). Rancang Bangun Aplikasi Kriptografi Pada Teks Menggunakan Metode Reverse Chiper Dan Rsa Berbasis Android. Jurnal Teknik Informatika Kaputama (JTIK), 3(2), 29–37.

Downloads


Crossmark Updates

How to Cite

Arif, A. ., Perdana, A. ., & Budiman, A. . (2022). Implementation Combination Cryptographic Algorithm Triangle Chain Cipher and Vigenere Cipher In Securing Data in Database. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 6(1), 100-110. https://doi.org/10.33395/sinkron.v7i1.11236

Most read articles by the same author(s)