Implementasi Teknik Enkripsi Menggunakan Algoritma XXTEA (Corrected Block Tiny Encryption Algorithm) Untuk Penyandian Record Data Pada Database
Abstract
In this computer era, many schools still implement conventional exam systems or exams using leaflets for their students, not a few of the teachers still make their answer keys using paper or put them in files, of course this will be very vulnerable to leaks and anyone will easily find out. Seeing the vulnerability of the answer key, the school or teachers must act so that there are no unwanted incidents, therefore the answer key sheets that are easy to find out must be immediately secured from irresponsible people by using cryptography techniques. Security techniques using cryptography are very appropriate for this, because cryptography is the science or art of security in cryptography there are many algorithms that can change clear text into ciphertext or encrypted messages that are only known by certain people so that the answer key cannot be easily read by irresponsible people.
Downloads
References
H. Zhao et al., “NPASS database update 2023: quantitative natural product activity and species source database for biomedical research,” Nucleic Acids Res, vol. 51, no. D1, pp. D621–D628, 2023.
Y. Zhou et al., “Therapeutic target database update 2022: facilitating drug discovery with enriched comparative data of targeted agents,” Nucleic Acids Res, vol. 50, no. D1, pp. D1398–D1407, 2022, doi: 10.1093/nar/gkab953.
K. ’Afiifah, Z. F. Azzahra, and A. D. Anggoro, “Analisis Teknik Entity-Relationship Diagram dalam Perancangan Database Sebuah Literature Review,” INTECH (Informatika dan Teknologi), vol. 3, no. 1, pp. 8–11, 2022, doi: 10.54895/intech.v3i1.1261.
E. Setyawati, H. Wijoyo, and N. Soeharmoko, Relational Database Management System (RDBMS). Thesis Commons, 2020. doi: 10.31237/osf.io/wuk6q.
N. W. Hidayatulloh, M. Tahir, H. Amalia, N. A. Basyar, A. F. Prianggara, and M. Yasin, “Mengenal Advance Encryption Standard (AES) sebagai Algoritma Kriptografi dalam Mengamankan Data,” Digital Transformation Technology, vol. 3, no. 1, pp. 1–10, 2023, doi: 10.47709/digitech.v3i1.2293.
R. Oktafiani, E. I. H. Ujianto, and R. Rianto, “Kombinasi Algoritma Kriptografi Vigenere Cipher dan SHA256 untuk Keamanan Basis Data,” Jurnal Sistem Komputer dan Informatika (JSON), vol. 4, no. 3, pp. 433–442, 2023, doi: 10.30865/json.v4i3.5583.
M. Azhari, D. I. Mulyana, F. J. Perwitosari, and F. Ali, “Implementasi Pengamanan Data pada Dokumen Menggunakan Algoritma Kriptografi Advanced Encryption Standard (AES),” Jurnal Pendidikan Sains dan Komputer, vol. 2, no. 01, pp. 163–171, 2022, doi: 10.47709/jpsk.v2i01.1390.
K. Andrea, A. Wardana, B. S. Wanandi, and A. Ikhwan, “Penerapan Kriptografi Caesar Cipher Pada Fitur Aplikasi Chatting Whatsapp,” Jurnal Penelitian Dan Pengkajian Ilmiah Eksakta, vol. 2, no. 1, pp. 6–11, 2023, doi: 10.47233/jppie.v2i1.660.
W. Wahyudi, D. Hartama, I. O. Kirana, S. Sumarno, and I. Gunawan, “Implementasi Algoritma Kriptografi Rivest Shamir Adlemen untuk Mengamankan Data Ijazah pada SMK Swasta Prama Artha Kab. Simalungun,” Jurnal Ilmu Komputer dan Informatika, vol. 2, no. 1, pp. 57–66, 2022, doi: 10.54082/jiki.19.
A. Ariska and W. Wahyuddin, “Penerapan Kriptografi Menggunakan Algoritma Des (Data Encryption Standard),” Jurnal Sintaks Logika, vol. 2, no. 2, pp. 9–19, 2022, doi: 10.31850/jsilog.v2i2.1734.
I. Riadi, A. Fadlil, and F. A. Tsani, “Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher,” JISKA (Jurnal Informatika Sunan Kalijaga), vol. 7, no. 1, pp. 33–45, 2022, doi: 10.14421/jiska.2022.7.1.33-45.
W. R. Maya, A. Azanuddin, and E. Elfitriani, “Implementasi Kriptografi Pengamanan Data Nilai Siswa Menggunakan Algoritma DES,” Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer), vol. 21, no. 1, pp. 1–9, 2022, doi: 10.53513/jis.v21i1.4764.
M. Hidayat, M. Tahir, A. Sukriyadi, and A. Sulton, “Penerapan Kriptografi Caesar Chiper dalam Pengamanan Data,” Jurnal Ilmiah Multidisiplin, vol. 2, no. 03, pp. 35–41, 2023, doi: 10.56127/jukim.v2i03.619.
P. G. Pamungkas and A. H. Muhammad, “Modifikasi Algoritma Kriptografi Caesar Chiper pada Deretan Simbol dan Huruf di Smarphone dan Laptop,” Journal of Information Technology, vol. 2, no. 1, pp. 1–5, 2022, doi: 10.46229/jifotech.v2i1.234.
E. M. Galas and B. D. Gerardo, “Implementing randomized salt on round key for corrected block tiny encryption algorithm (XXTEA),” in 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), IEEE, 2019, pp. 795–799. doi: 10.1109/ICCSN.2019.8905270.
H. P. H. Pandiangan, “Implementasi Algoritma Xtea (Extended Tyni Encryption Algoritma) Dalam Pengamanan Data File Dokumen Teks,” Bulletin of Information Technology (BIT), vol. 1, no. 3, pp. 122–133, 2020.
N. Anwar, S. Sinurat, and I. Saputra, “Penerapan Algoritma Xtea Dengan Metode Pembangkitan Kunci Linear Congruential Generator Untuk Pengamanan Teks Rahasia,” RESOLUSI: Rekayasa Teknik Informatika dan Informasi, vol. 2, no. 3, pp. 96–105, 2022, doi: 10.30865/resolusi.v2i3.272.
B. O. Sinaga, S. Sinurat, and T. Zebua, “Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen,” Journal of Informatics Management and Information Technology, vol. 1, no. 4, pp. 144–152, 2021, doi: 10.47065/jimat.v1i4.130.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Teknik Enkripsi Menggunakan Algoritma XXTEA (Corrected Block Tiny Encryption Algorithm) Untuk Penyandian Record Data Pada Database
Pages: 243-250
Copyright (c) 2024 Cici Rahmadani

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).