Implementasi Teknik Enkripsi Menggunakan Algoritma XXTEA (Corrected Block Tiny Encryption Algorithm) Untuk Penyandian Record Data Pada Database


  • Cici Rahmadani * Mail Universitas Budi Darma, Medan, Indonesia
  • (*) Corresponding Author
Keywords: Cryptography; XXTEA; Record; Answer Key

Abstract

In this computer era, many schools still implement conventional exam systems or exams using leaflets for their students, not a few of the teachers still make their answer keys using paper or put them in files, of course this will be very vulnerable to leaks and anyone will easily find out. Seeing the vulnerability of the answer key, the school or teachers must act so that there are no unwanted incidents, therefore the answer key sheets that are easy to find out must be immediately secured from irresponsible people by using cryptography techniques. Security techniques using cryptography are very appropriate for this, because cryptography is the science or art of security in cryptography there are many algorithms that can change clear text into ciphertext or encrypted messages that are only known by certain people so that the answer key cannot be easily read by irresponsible people.

Downloads

Download data is not yet available.

References

H. Zhao et al., “NPASS database update 2023: quantitative natural product activity and species source database for biomedical research,” Nucleic Acids Res, vol. 51, no. D1, pp. D621–D628, 2023.

Y. Zhou et al., “Therapeutic target database update 2022: facilitating drug discovery with enriched comparative data of targeted agents,” Nucleic Acids Res, vol. 50, no. D1, pp. D1398–D1407, 2022, doi: 10.1093/nar/gkab953.

K. ’Afiifah, Z. F. Azzahra, and A. D. Anggoro, “Analisis Teknik Entity-Relationship Diagram dalam Perancangan Database Sebuah Literature Review,” INTECH (Informatika dan Teknologi), vol. 3, no. 1, pp. 8–11, 2022, doi: 10.54895/intech.v3i1.1261.

E. Setyawati, H. Wijoyo, and N. Soeharmoko, Relational Database Management System (RDBMS). Thesis Commons, 2020. doi: 10.31237/osf.io/wuk6q.

N. W. Hidayatulloh, M. Tahir, H. Amalia, N. A. Basyar, A. F. Prianggara, and M. Yasin, “Mengenal Advance Encryption Standard (AES) sebagai Algoritma Kriptografi dalam Mengamankan Data,” Digital Transformation Technology, vol. 3, no. 1, pp. 1–10, 2023, doi: 10.47709/digitech.v3i1.2293.

R. Oktafiani, E. I. H. Ujianto, and R. Rianto, “Kombinasi Algoritma Kriptografi Vigenere Cipher dan SHA256 untuk Keamanan Basis Data,” Jurnal Sistem Komputer dan Informatika (JSON), vol. 4, no. 3, pp. 433–442, 2023, doi: 10.30865/json.v4i3.5583.

M. Azhari, D. I. Mulyana, F. J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” Jurnal Pendidikan Sains dan Komputer, vol. 2, no. 01, pp. 163–171, 2022, doi: 10.47709/jpsk.v2i01.1390.

K. Andrea, A. Wardana, B. S. Wanandi, and A. Ikhwan, “Penerapan Kriptografi Caesar Cipher Pada Fitur Aplikasi Chatting Whatsapp,” Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta, vol. 2, no. 1, pp. 6–11, 2023, doi: 10.47233/jppie.v2i1.660.

W. Wahyudi, D. Hartama, I. O. Kirana, S. Sumarno, and I. Gunawan, “Implementasi Algoritma Kriptografi Rivest Shamir Adlemen untuk Mengamankan Data Ijazah pada SMK Swasta Prama Artha Kab. Simalungun,” Jurnal Ilmu Komputer dan Informatika, vol. 2, no. 1, pp. 57–66, 2022, doi: 10.54082/jiki.19.

A. Ariska and W. Wahyuddin, “Penerapan Kriptografi Menggunakan Algoritma Des (Data Encryption Standard),” Jurnal Sintaks Logika, vol. 2, no. 2, pp. 9–19, 2022, doi: 10.31850/jsilog.v2i2.1734.

I. Riadi, A. Fadlil, and F. A. Tsani, “Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher,” JISKA (Jurnal Informatika Sunan Kalijaga), vol. 7, no. 1, pp. 33–45, 2022, doi: 10.14421/jiska.2022.7.1.33-45.

W. R. Maya, A. Azanuddin, and E. Elfitriani, “Implementasi Kriptografi Pengamanan Data Nilai Siswa Menggunakan Algoritma DES,” Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer), vol. 21, no. 1, pp. 1–9, 2022, doi: 10.53513/jis.v21i1.4764.

M. Hidayat, M. Tahir, A. Sukriyadi, and A. Sulton, “Penerapan Kriptografi Caesar Chiper dalam Pengamanan Data,” Jurnal Ilmiah Multidisiplin, vol. 2, no. 03, pp. 35–41, 2023, doi: 10.56127/jukim.v2i03.619.

P. G. Pamungkas and A. H. Muhammad, “Modifikasi Algoritma Kriptografi Caesar Chiper pada Deretan Simbol dan Huruf di Smarphone dan Laptop,” Journal of Information Technology, vol. 2, no. 1, pp. 1–5, 2022, doi: 10.46229/jifotech.v2i1.234.

E. M. Galas and B. D. Gerardo, “Implementing randomized salt on round key for corrected block tiny encryption algorithm (XXTEA),” in 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), IEEE, 2019, pp. 795–799. doi: 10.1109/ICCSN.2019.8905270.

H. P. H. Pandiangan, “Implementasi Algoritma Xtea (Extended Tyni Encryption Algoritma) Dalam Pengamanan Data File Dokumen Teks,” Bulletin of Information Technology (BIT), vol. 1, no. 3, pp. 122–133, 2020.

N. Anwar, S. Sinurat, and I. Saputra, “Penerapan Algoritma Xtea Dengan Metode Pembangkitan Kunci Linear Congruential Generator Untuk Pengamanan Teks Rahasia,” RESOLUSI: Rekayasa Teknik Informatika dan Informasi, vol. 2, no. 3, pp. 96–105, 2022, doi: 10.30865/resolusi.v2i3.272.

B. O. Sinaga, S. Sinurat, and T. Zebua, “Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen,” Journal of Informatics Management and Information Technology, vol. 1, no. 4, pp. 144–152, 2021, doi: 10.47065/jimat.v1i4.130.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Teknik Enkripsi Menggunakan Algoritma XXTEA (Corrected Block Tiny Encryption Algorithm) Untuk Penyandian Record Data Pada Database

Dimensions Badge
Article History
Published: 2024-06-30
Abstract View: 340 times
PDF Download: 286 times
Issue
Section
Articles