Main Article Content

Juli Wahyuni
Indra Gunawan
Ika Okta Kirana
Rafiqa Dewi
Solikhun Solikhun

Abstract

In this era, technology is increasingly advanced and rapid, where data confidentiality is one of the things that is very important for a company. Employee data is data that is very important for the company. So it needs a system that can secure a database of employees from various types of hecker attacks or eavesdroppers who can steal and damage data. Cryptography is a science based on mathematical techniques that deal with information security such as data confidentiality. Triple DES algorithm is a development of DES algorithm, the algorithm used is the same, only in Triple DES algorithm, the encryption and decryption process is done 3 times. Triple DES also has three different keys. The three keys used can be mutually independent (K1 ? K2 ? K3) or only two keys are  mutually independent and one other key is the same as the first key (K1 ? K2 and K3 = K1). This algorithm can generate encryption that cannot be read or understood by humans and results in the exact decryption of the initial plaintext input.

Downloads

Download data is not yet available.

Article Details

How to Cite
Wahyuni, J., Gunawan, I., Kirana, I. O., Dewi, R. and Solikhun, S. (2020) “Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar: Des Triple Algorithm in Security Office Data Security Mayor Pematangsiantar”, Jurnal Mantik, 3(4), pp. 714-722. Available at: https://iocscience.org/ejournal/index.php/mantik/article/view/682 (Accessed: 29March2024).
References
[1] A. H. Pangaribuan, “Perancangan Aplikasi Pengamanan Data Teks Dengan Metode Advanced Encryption Standard ( AES ) Dan Metode End Of File( EOF ),” J. INFOTEK, vol. 1, no. 2, pp. 5–10, 2016.
[2] A. Fauzi, Novriyenni, Y. Maulita, and A. M. H. Pardede, “Analisi Hybrid Cryptosystem Algoritma Algoritma RSA Dan TRIPLE DES,” J. Tek. Inform. Kaputama, vol. 1, no. 2, pp. 36–44, 2017.
[3] M. Sanwasih, “Penerapan Aplikasi Pengamanan Data / FileDengan Metode Enkripsi Dan Dekripsi Algoritma 3DES,” Semin. Nas. Teknol. Inf. dan Multimed., pp. 43–48, 2017.
[4] K. H. Kartika, A. Y. A. P, and S. Tendean, “Perancangan Sistem Kkriptografi Pada Document Menggunakan Algoritma TRIPLE DES Dan RSA,” J. Inteksis STMIK Widya Dharma., pp. 1–11, 2018.
[5] E. Budi, H. Sibarani, P. M. Zarlis, and R. W. Sembiring, “Analisis Kripto Sistem Algoritma AES Dan Elliptic Curve Cryp ( ECC ) Untuk Keamanan Data,” 2017.
[6] Siswanto, Feriadi, G. P. Utama, and A. F. Achmad, “Pengamanan Data Dengan Menggunakan Algoritma Kriptografi AES, RC4 dan Komperesi LZ77 Berbasis Java Pada Badan Karantina Pertanian,” Semin. Nas. Telekomun. dan Inform., pp. 115–120, 2016.
[7] M. K. Harahap, “Analisis Perbandingan Algoritma Kriptografi Klasik Vigenere Cipher dan One Time Pad,” J. Nas. Inform. dan Teknol. Jar., vol. 1, no. 1, pp. 61–64, 2016.
[8] B. Purnama and M. Kom, “Pengamanan Pesan Rahasia Melalui Kriptografi Vigenere Cipher dengan Kunci Berlapis,” J. Ilm. Media Process., vol. 9, no. 3, pp. 264–269, 2014.
[9] Liana, Sutardi, and N. F. Muchlis, “Aplikasi Enkripsi dan Dekripsi Data Menggunakan Tiny Encyption Algoritma (Tea) Berbasis Java,” semanTIK, vol. 4, no. 1, pp. 39–48, 2018.