Rivest Cipher 6 Algorithm Method to secure messages of Medical Record files at Perlayuan Health Center
DOI:
10.33395/sinkron.v7i2.11391Keywords:
File Rekam Medis; Pengamanan File; Puskesmas Perlayuan; Medis; FileAbstract
This study aims to provide an effort to secure files in order to maintain important documents as assets for the Perlayuan Health Center. The Perlayuan Health Center is one of the world's health units whose role is to support health and the security of medical record files. Important factual documents that have been recorded regarding the historical history of symptoms and diseases that have been recorded such as disease or illness conditions, prevention or healing techniques that have been carried out and have been missed have previously been documented by the Health service at the Perlayuan Health Center. Medical records have or keep important records that are documented with data in the form of patient identities, examinations, treatment, actions from the facilitators of the Perlayuan Health Center. Rivest's Cipher 6 method is used to lock files. The medical record aims to be an initial benchmark to continue the action plan for drugs and treatments that will be applied. File security with At the Perlayuan Health Center there is very little security for a file because each data is not only stored on one computer and if needed the file will be copied to anyone who asks for the file. That way the file is no longer guaranteed security and confidentiality. Anyone can easily retrieve files by copying formatted encryption or data encryption. Rivest's Cipher 6 algorithm can break 128 bits blocks into 4 sets of 32 bits and this algorithm can work with 4 32 bits registers X, B, Y and D.
Downloads
References
T Prasetyo, R. P. (2020, Maret). Sistem Informasi Administrasi Pemerintahan Desa pada Desa Cilayung Kabupaten Kuningan. Jurnal Teknologi dan Informasi (JATI), 10.
Ardede, AMH, Sitepu, LPB, Zarlis, M., Iskandar, A., Sriadhi, S., Manurung, RT, ... & Winarno, E. (2019, November). Application of Message Security Application Using Vigenere Cipher Algorithm Utilizing One Time Pad (OTP) Algorithm as a Key Generator. In Journal of Physics: Conference Series (Vol. 1363, No. 1, p. 012080). IOP Publishing.
Toyib, R., & Wijaya, A. (2019). COMPARISON ANALYSIS OF RIVEST SYMETRIC ALGORITHM CODE 5 WITH RIVEST SYMETRIC ALGORITHM CODE 6) (Case Study: SMK Negeri Seluma). Upgris Journal of Informatics, 4(2), 203–209. H
Kristianto, BD, Gat, G., & Syarifudin, G. (2020). Sms Encryption Software Design Using Rivest Cipher 6 And Rijndael Algorithm On Smartphones. Sisfotenika, 10(1), 115.https://doi.org/10.30700/jst.v10i1.948
Budiman, A., & Paradise, P. (2019). Modification of Vigenere Algorithm and One Time Pad Using Rivest Code 6 (RC6) Key Expansion. Compilers, 8(2), 149–156. https://doi.org/10.28989/compiler.v8i2.481
Kurniawan, D. (2018). Planning Text Data Security Applications Using Blowfish And Rc6. Journal of Informatics Pelita, ISSN 2301-9425 (Print Media), 17(3), 254–260.
Kurniawan, RA, & Avianto, D. (2019). Design of an Encrypted Short Message Application With Web-Based Advanced Encryption Standard (Aes) Algorithm.
Laurentine. (2017). Implementation of Cryptography and Sms Compression Using the Rivest Cipher 6 Algorithm and Android-Based Huffman Algorithm. Scientific Journal of Global Informatics, 8(1), 36–42.
Padede, AMH, Manurung, H., & Filina, D. (2017). Vigenere Cipher And Hill Cipher Algorithm In Data Security Applications In Document Files. JTIK (Journal of Informatics Engineering Kaputama), 1(1), 26-33.
Atmojo, WP, Isnanto, RR, & Kridalukmana, R. (2016).Implementation of Cryptographic Applications on Short Message Service (SMS) Using Android-Based RIVEST CIPHER 6 Algorithm. Journal of Technology and Computer Systems, 4
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2022 Rapandi Ritonga, Deci Irmayani, Ali Akbar Ritonga
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.