Main Article Content

Jonas Franky Rudianto Panggabean
Leliana Harahap
Sartika Dewi Purba
Sutrisno Situmorang
Kamson Sirait

Abstract

Data is an authentic fact or evidence which must be stored and kept secure in order to avoid unwanted disturbances or threats. To avoid threats from parties who abuse or are not responsible, there are many ways to secure data, one way to do this is to create an encryption method. Methods of data security can be seen from the confidentiality of data against a threat that can be used with the blowfish algorithm. Blowfish is a 64-bit block chipper with variable key length. This algorithm can encrypt data in text form. This encryption produces ciphertext that is easy to understand and understand. Ciphertext is changing the form of text into codes that are difficult to understand and can be returned to their original position if using the same key when the data is encrypted. Data encryption techniques in databases are one of the steps used to secure and maintain data confidentiality. With this database encryption, code can be generated so that people who do not have access rights cannot access the database because the key has been generated. Database is a storage place for collections of data and information. The entire academy information system is stored in the database. Therefore, to maintain the security of the academy information database on the Medicom campus, cryptography with the Blowfish algorithm is needed. In this regard, the authors are very interested in carrying out an implementation of a document data / information security with cryptographic techniques using the Blowfish and Base64 algorithm methods. This algorithm technique was chosen because modern cryptography is a symmetric key in the form of a block cipher. This built Blowfish algorithm can encrypt text in text form. Encryption is done using a certain key, resulting in ciphertext.

Downloads

Download data is not yet available.

Article Details

How to Cite
Panggabean, J. F. R., Harahap, L. ., Purba, S. D. ., Situmorang, S. . and Sirait, K. . (2023) “Implementation of academy information database security using the blowfish method on the Medicom Campus”, Jurnal Mantik, 7(2), pp. 765-773. doi: 10.35335/mantik.v7i2.3875.
References
Ahmad Timbul Sholeh, E. G. (2013). MENGAMANKAN SKRIP PADA BAHASA PEMOGRAMAN PHP DENGAN MENGGUNAKAN KRIPTOGRAFI BASE64 . Jurnal Algoritma Sekolah Tinggi Teknologi Garut , 1-9.
Alfikri. (2019). Studi dan Analisis Dua Jenis Algoritma Block Cipher:DES RC5. Bandung: Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung.
Alfikri, Z. F. (2011). Studi dan Analisis Dua Jenis Algoritma Block Cipher. Bandung.
Ariyus, D. (2018). Kriptografi Keamanan Data Dan Komunikasi. Yogyakarta: Graha Ilmu.
Aziz. (2016). Penerapan Kriptografi Base64 Untuk Keamanan URL (Uniform Resource Locator) Website Dari Serangan SQL Injection. Jurnal Algoritma, 1-8.
Cendra Wadisman, d. (2020). PENGAMANAN DATABASE MENGGUNAKAN KOMBINASI ALGORITMA (CEST CRYPTOGRAPHY) DAN Algoritma BASE64. JURTEKSI (Jurnal Teknologi dan Sistem Informasi).
Dewanti, F. E. (2019). Implementasi Kriptografi dalam Sistem Keamanan Anjungan Tunai Mandiri. J. Inform. Upgris.
Dominic, B. (2012). A Cryptographic Algorithm Based on a Pseudorandom Number Generator. International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.
Donzilo. (2018). Perbandingan Algoritma DES,AES,IDEA, Dan Blowfish Dalam Enkripsi Dan Dekripsi Data’, Jurnal Teknologi Terpadu. Jurnal Teknologi Terpadu.
F. N. Pabokory, I. F. (2020). Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard. Inform. Mulawarman J. Ilm. Ilmu Komputer.
Hadriansa, M. F. (2021). Rekayasa Aplikasi Kriptografi dengan Penerapan Kombinasi Algoritma Knapsack Merkle Hellman dan Affine Cipher. J. Teknol. Inf. dan Ilmu Komputer.
Mansoor, O. S. (2020). Performance Analysis of Stream and Block Cipher Algorithms. Third International Conference on Advanced Computer Theory and Engineering (ICACTE).
Mayuni. (2021). Implementasi Algoritma Knapsack dan Algoritma Spritz dalam Mengamankan File. Jurnal Teknologi dan Sistem Informasi.
Mohammad. (2012). Implementasi Sistem Enkripsi Pengiriman Pesan Instan Java Dengan Algoritma Blowfish. Jurnal Format.
Munir, R. (2006). Kriptografi. Bandung: Informatika.
N, A. (2017). Penerapan Kriptografi Base64 Untuk Keamanan URL (Uniform Resource Locator) Website Dari Serangan SQL Injection. Jurnal Algoritma.
N. Fahriani, P. A. (2019). Alternatif Penanganan Jenis Serangan Pencurian Data Pada Jaringan Komputer. Teknol. dan Rekayasa Inf.
Nandar Pabokory, F. d. (2015). Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard. Jurnal Informatika Mulawarman.
Nani, P. A. (2011). Penerapan Enkripsi Algoritma Blowfish Pada Proses Steganografi Metode EOF. Kupang: Universitas Katolik Widya Mandira.
Nugraha, E. G. (2021). Penerapan Kriptografi Base64 Untuk Keamanan URL (Uniform Resource Locator) Website Dari Serangan SQL Injection. J. Algoritm.
Nurmi Hidayasari, d. (2022). Penerapan Keamanan Basis Data Dengan Menggunakan Kombinasi Teknik Enkripsi SHA Dan Knapsack. Jurnal Nasional Industri dan Teknologi .
Rio. (2011). Implementasi Algoritma RSA Dan Blowfish Untuk Enkripsi Dan Deskripsi Data Menggunakan Delphi 7. Jakarta: Fakultas Sains dan Teknologi Universitas Islam Negeri Jakarta.
S. Supiyandi, H. H. (2020). Implementasi dan Penggunaan Algoritma Base64 dalam Pengamanan File Video. J. MEDIA Inform. BUDIDARMA.
Schneier, B. (1994). Description of a New Variable-Length Key, 64-Bit Block Cipher. Springer Verlag.
Siswo Wardoyo, R. F. (2016). Aplikasi Teknik Enkripsi Dan Dekripsi File Dengan Algoritma Blowfish Pada Perangkat Mobile Berbasis Android . SETRUM, 2301-4652 .
Sumartini, A. R. (2019). Implementasi Kriptografi Menggunakan Metode Blowfish Dan Base 64 Untuk Mengamankan Database Informasi Akademik Pada Kampus Akademi Telekomunikasi Bogor Berbasis Web-based. Jurnal E-KOMTEK (Elektro-Komputer-Teknik) .
Utomo. (2017). Implementasi Algoritma Blowfish untuk Enkripsi Database Mysql pada Sistem Informasi Data Aset Berbasis Web. Faculty of Information Technology T1 - Informatics Engineering.
Yeni Yanti, d. (2021). Implementasi Sistem Keamanan Database Menggunakan Metode Triangle Chain. Serambi Engineering.