Penerapan Algoritma Vertical Bit Rotation Dalam Pengamanan Data Sekolah
Abstract
Cryptography is a science based on mathematical techniques related to security and information such as confidentiality, data integrity and entity authentication. In other words, it means to conduct the process of encoding libraries that act as ciphers, and converting the original text into illegal it. The implementation of encryption process requires a public and a secret key. One of the cryptography techniques applied in the research is the Algorithm of Vertical Bit Rotation (VBR). The VBR is a technique that implements an asymmetric key, which it has a same value in term of data encryption and decryption. The technique is also applied in the shape of an application designed in this research, then have ability to run encryption and decryption process in the format of text file, that providing data security to avoid eavesdropping and illegal access from irresponsible parties. The result done by using VBR is it may run well so have ability to restore the condition of the data in plaintext, then in addition information, encrypted data cannot be returned to its pure form without using a valid key
Downloads
References
D. J. E. Prihanto and M. I. Pakereng, “Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Tarian Sajojo Papua,” Ultim. Comput. J. Sist. Komput., vol. 11, no. 2, pp. 71–80, 2020, doi: 10.31937/sk.v11i2.1454.
S. Agustini and M. Kurniawan, “Peningkatan Keamanan Teks Menggunakan Kriptografi Dan Steganografi,” SCAN - J. Teknol. Inf. dan Komun., vol. 14, no. 3, pp. 33–38, 2019, doi: 10.33005/scan.v14i3.1685.
R. Aulia, A. Zakir, and D. A. Purwanto, “Penerapan Kombinasi Algoritma Base64 Dan Rot47 Untuk Enkripsi Database Pasien Rumah Sakit Jiwa Prof. Dr. Muhammad Ildrem,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 2, no. 2, pp. 146–151, 2018, doi: 10.30743/infotekjar.v2i2.300.
J. T. Elektro and P. N. Bandung, “Algoritma Labeling Citra Biner Dengan Performansi Optimal Processor-Time,” elektro, vol. 4, no. 1, p. pp.18-26, 2003, doi: 10.9744/informatika.4.1.pp.18-26.
E. N. Citra, “Penerapan Algoritma Vertical Bit Rotation ( VBR ) Dalam Penyimpanan File Online,” MEANS (Media Inf. Anal. dan Sist., vol. 3, no. 1, pp. 16–23, 2018.
S. Tri, C. Kurniawan, T. Informatika, and S. Informasi, “Implementasi Kriptografi Algoritma Rivest Shamir Adleman dengan Playfair Cipher pada Pesan Teks Berbasis Android,” vol. 2, no. 2, pp. 102–109, 2017, doi: 10.15575/join.v2i2.113.
I. Print, R. Aulia, A. Zakir, and M. Zulhafiz, “InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan Penerapan Algoritma One Time Pad & Linear Congruential Generator Untuk Keamanan Pesan Teks,” J. Nas. Inform. Dan Ilmu Komput., vol. 1, 2019.
M. R. Rambe, E. V. Haryanto, and A. Setiawan, “Aplikasi Pengamanan Data dan Disisipkan Pada Gambar dengan Algoritma RSA Dan Modified LSB Berbasis Android,” pp. 8–9, 2018.
S. Indonesia, J. P. Hidayatullah, and T. Wa, “Jurnal Sains Komputer dan Teknologi Informasi Page Yeffriansjah Salim . Implementasi Algoritma Vertical Bit Rotation ( Vbr ) Pada File Teks .,” vol. 3, no. 1, pp. 41–51, 2020.
A. Utama and R. F. Siahaan, “Penerapan Kriptografi untuk Pengamanan Data Transaksi Deposito pada Easy Tronik dengan Metode RC-5,” J. Ilmu Komput. dan Sist. …, vol. 3, no. 3, pp. 29–39, 2021, [Online]. Available: http://ejournal.sisfokomtek.org/index.php/jikom/article/view/86.
F. Azmi and W. Erika, “Analisis Keamanan Data Pada Block Cipher Algoritma Kriptografi Rsa,” CESS (Journal Comput. Eng. Syst. Sci., vol. 2, no. 1, pp. 27–29, 2017.
R. Nuari and N. Ratama, “Implementasi Algoritma Kriptografi AES (Advanced Encryption Standard) 128 Bit Untuk Pengamanan Dokumen Shipping,” J. Artif. Intell. Innov. Appl., vol. 1, no. 2, pp. 2716–1501, 2020, [Online]. Available: http://openjournal.unpam.ac.id/index.php/JOAIIA.
Y. Reswan, U. Juhardi, B. T. Yuliansyah, and U. M. Bengkulu, “Implementasi Kompilasi Algoritma Kriptografi Transposisi Columnar Dan Rsa Untuk Pengamanan Pesan Rahasia,” vol. 4, no. 2, 2018.
M. Y. Simargolang, “IMPLEMENTASI KRIPTOGRAFI RSA DENGAN PHP,” vol. 1, pp. 1–10, 2017.
S. Waluyo and D. V. Kanahebi, “SISTEM PENGAMANAN FILE MENGGUNAKAN ALGORITMA RC4 BERBASIS WEBBASE STUDI KASUS : PT . TJIPTA JAYA BERSAMA,” pp. 803–808, 2021.
O. Dakhi, M. Masril, R. Novalinda, J. Jufrinaldi, and A. Ambiyar, “Analisis Sistem Kriptografi dalam Mengamankan Data Pesan Dengan Metode One Time Pad Cipher,” INVOTEK J. Inov. Vokasional dan Teknol., vol. 20, no. 1, pp. 27–36, 2020, doi: 10.24036/invotek.v20i1.647.
F. Alfonita, “F. alfonita,” Comput. Ind. Eng., vol. 2, no. January, p. 6, 2018, [Online]. Available: http://ieeeauthorcenter.ieee.org/wp-content/uploads/IEEE-Reference-Guide.pdf%0Ahttp://wwwlib.murdoch.edu.au/find/citation/ieee.html%0Ahttps://doi.org/10.1016/j.cie.2019.07.022%0Ahttps://github.com/ethereum/wiki/wiki/White-Paper%0Ahttps://tore.tuhh.de/hand.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Penerapan Algoritma Vertical Bit Rotation Dalam Pengamanan Data Sekolah
Pages: 713-718
Copyright (c) 2022 Rachmat Aulia, Haida Dafitri, Bayu Irwandi, Rizko Liza

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).





















