Implementasi Algoritma Camellia Pada Penyandian Record Database


  • Neti Rusri Yanti Budi Darma
  • Taronisokhi Zebua Budi Darma
Keywords: Cryptography, Record, Database, Camellia

Abstract

Database records in the form of text are very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of database records, it can be done by using cryptographic techniques. Cryptographic techniques can encode database records by encrypting them in the form of passwords that are not understood. The Camellia algorithm is one algorithm that can be relied upon to realize cryptographic techniques. This symmetry algorithm will produce a higher level of security against the database record because it can encode it into a password with a fairly complex process that will make it difficult for cryptanalysts to access the database. This research will use the 128 bit Camellia algorithm for the encryption and decryption process, so that in the process it is necessary to go through several long steps in order to produce the final cipher. This algorithm requires 18 rounds where every six rounds must enter Function F and Function FL-1 and also require as many as 26 subkeys, namely kw, k and kl. This study describes the process of securing a database record by encoding it based on the Camellia algorithm, so that it produces a text record database in the form of a password that is difficult for others to understand and understand. This is done in an effort to minimize acts of misuse of database records.

Downloads

Download data is not yet available.

References

Y. Yanti, Munawir, Zulfan, and Erdiwansyah, “Implementasi Sistem Keamanan Database Menggunakan Metode Triangle Chain,” Serambi Eng., vol. II, no. 4, pp. 172–175, 2017.

R. K. Hondro and G. W. Nurcahyo, “ANALISIS DAN PERANCANGAN SISTEM YANG MENERAPKAN ALGORITMA TRIANGLE CHAIN CIPHER ( TCC) UNTUK ENKRIPSI RECORD TABEL DATABASE,” J. Teknol. Inf. dan Komput., vol. 3, no. Desember, pp. 118–127, 2014.

T. Zebua, “TRIANGLE CHAIN PADA PENYANDIAN RECORD DATABASE ...,” Pelita Inform. Budi Darma, vol. 3, no. April, pp. 37–49, 2013.

Rusdianto and A. Qashlim, “IMPLEMENTASI ALGORITMA MD5 UNTUK KEAMANAN DOKUMEN,” J. Ilm. Ilmu Komput., vol. 2, no. 2, pp. 10–16, 2016.

L. Sutanto, G. S. Budhi, and L. W. Santoso, “PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY,” J. Inform., vol. 12, no. 2, pp. 109–116, 2014.

R. H. Zain, “Perancangan Dan Implementasi Cryptography Dengan Metode Algoritma Rc4 Pada Type File Document Menggunakan Bahasa Pemrograman Visual Basic 6 . 0,” J. Momentum, vol. 12, no. 1, pp. 71–80, 2012.

N. R. Yanti, Alimah, and D. A. Ritonga, “Implementasi Algoritma Data Encryption Standard Pada Penyandian Record Database,” J. Sains Komput. Inform., vol. 2, no. 1, pp. 23–32, 2018.

D. Ariyus, TEORI ILMU KRIPTOGRAFI Teori Analisis dan Implementasi, I. Yogyakarta: ANDI, 2008.

E. Setyaningsih, Kriptografi & Implementasinya Menggunakan MATLAB, I. Yogyakarta: ANDI, 2015.

R. Munir, Kriptografi. Bandung: INFORMATIKA Bandung, 2006.

R. Sadikin, Kriptografi untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java. Yogyakarta: ANDI, 2012.

B. S. W. Poetro and R. Wardoyo, “Perbandingan Efisiensi , Efektifitas dan Kualitas Algoritma Rijndael dengan Algoritma Camellia pada Citra Digital,” J. Math. Nat. Sci., vol. 24, no. 3, pp. 281–291, 2014.

K. Aoki et al., “Camellia : A 128-Bit Block Cipher Suitable for Multiple Platforms – Design and Analysis Structure of Camellia,” Springer-Verlag Berlin Heidelb., pp. 39–56, 2001.

P. B. Santoso, “Budi Akademika,” 2012. [Online]. Available: http://pbsabn.lecture.ub.ac.id/2012/05/hierarki-data-data-hierarchy/. [Accessed: 19-Jul-2018].

A. B. bin Ladjamuddin, Konsep Sistem Basis Data dan Implementasinya, I. Yogyakarta: Graha Ilmu, 2004.

M. Shalahuddin and A. Rossa, Rekayasa Perangkat Lunak Terstruktur dan Berorientasi Objek, I. B: Modula, 2011.

P. Pudjo and H. Widodo, Menggunakan UML, I. Bandung: INFORMATIKA Bandung, 2011.

J. Hartono M, Analisi Desain. Yogyakarta: ANDI, 2005.

W. Komputer, Panduan Aplikasi dan Solusi (PAS) Membuat Aplikasi Client Server dengan Visual Basic 2008, I. Semarang: ANDI, 2010.

A. Nugroho, Mengembangkan Aplikasi Basis Data Menggunakan Visual Basic.NET dan Oracle, I. Yogyakarta: ANDI, 2010.

P. A. Aditya, Perancangan & Pembangunan Sistem Informasi, II. Yogyakarta: ANDI, 2006.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Algoritma Camellia Pada Penyandian Record Database

Published
2020-05-25