Aplikasi Keamanan Data Berbasis Web Menggunakan Algoritma AES 128 Untuk Enkripsi Dan Dekripsi Data

Authors

  • Aprizaldi Aprizald Univeristas Lancang Kuning
  • Mhd Arief Hasan Universitas Lancang Kuning
  • Debi Setiawan Univeristas Abdurrab

DOI:

https://doi.org/10.58794/jekin.v2i2.225

Keywords:

Aplikasi, Algoritma AES 128, Keamanan Data, PHP, MySql

Abstract

Folio Sheeter Division is a division of PT. Indah Kiat Pulp And Paper, which is located in Siak Regency, which is one of the leading paper mills in Riau Province. The Folio Sheeter Division requires an application that can process production data. The application can only be accessed internally, the production process is a company secret because in production there are several mix processes or mix formulations of quality and production quality so that the materials and data are not published. The process is digital text that is encrypted by user to user. Every production result, the supervisor will inform the assistant about the combination of the mix of production materials that will be processed to carry out production according to what consumers want. From the author's observations at the research site that the information shared by supervisors can be read by all employees or staff, this information can be seen clearly by users or staff who are not interested so that the production and process data can be known by other staff who are not interested, so it is possible that the data could be given to irresponsible parties. The types of data or files that exist are in the form of data records and supporting document files such as doc, xls and pdf. Production data will be encrypted with cryptographic techniques so that production data cannot be seen by others but the user himself or the user who is permitted in the form of decryption who can access it. Notification of information to staff or assistants is still fairly manual, because the provision of information in paper form and easily read by others. For this reason, the authors are interested in using the AES 128 algorithm to encrypt and decrypt data so that the process and production results in the form of data can be maintained.

Downloads

Download data is not yet available.

References

G. Rahmi Fajri et al., “KEAMANAN DATA PADA PENGARSIPAN SURAT MENGGUNAKAN METODE KRIPTOGRAFI KLASIK VIGENERE CIPHER DAN SHIFT CIPHER,” 2020. doi: https://doi.org/10.31849/zn.v2i1.6220.

S. Widiyanto, G. Adnan, M. Fatkuroji, D. W. Handoyo, and M. A. Hasan, “Pengamanan Pesan Text dengan menggunakan Kriptografi Klasik Metode Shift Chipper dan Metode Substitution Chipper,” 2021. doi: https://doi.org/10.30606/rjocs.v7i1.2090.

R. Feraldi et al., “KOMBINASI ALGORITMA KRIFTOGRAFI CAESAR CIPHER DAN PERMUTATION CIPHER UNTUK PESAN TEKS MENGGUNAKAN PYTHON,” Riau Journal of Empowerment, vol. 7, no. 01, pp. 76–86, 2021, doi: https://doi.org/10.30606/rjocs.v7i1.2095.

Megawati, Muhammad Fitra Hamidy, Sasqia Ismi Aulia, Yuhendri Putra, and Mhd Arief Hasan, “Enkripsi dan Deskripsi File Menggunakan Kombinasi Vigenere dan Shift Cipher di Python,” SATIN - Sains dan Teknologi Informasi, vol. 7, no. 1, pp. 102–111, Jun. 2021, doi: 10.33372/stn.v7i1.686.

J. Simorangkir and M. Arief, “Sistem Verifikasi Dokumen Menggunakan QR-Code di Prodi Teknik Informatika Fakultas Ilmu Komputer Universitas Lancang Kuning,” Sistem dan Teknologi Informasi, vol. 8, no. 4, pp. 369–375, 2020, doi: 10.26418/justin.v8i4.42315.

A. Prameshwari and N. P. Sastra, “Implementasi Algoritma Advanced Encryption Standard (AES) 128 Untuk Enkripsi dan Dekripsi File Dokumen,” Eksplora Informatika, vol. 8, no. 1, p. 52, Sep. 2018, doi: 10.30864/eksplora.v8i1.139.

L. Thulasimani and M. Madheswaran, “A SINGLE CHIP DESIGN AND IMPLEMENTATION OF AES-128/192/256 ENCRYPTION ALGORITHMS,” 2010.

J. H. Penelitian and H. Wijaya, “JURNAL AKADEMIKA PENERBIT IMPLEMENTASI KRIPTOGRAFI AES-128 UNTUK MENGAMANKAN URL (UNIFORM RESOURCE LOCATOR) DARI SQL INJECTION,” vol. 17, no. 1, 2020, [Online]. Available: https://www.

F. Brandt, “Efficient cryptographic protocol design based on distributed El Gamal encryption,” in International Conference on Information Security and Cryptology, 2005, pp. 32–47.

K. L. Tsai, Y. L. Huang, F. Y. Leu, I. You, Y. L. Huang, and C. H. Tsai, “AES-128 based secure low power communication for LoRaWAN IoT environments,” IEEE Access, vol. 6, pp. 45325–45334, Jul. 2018, doi: 10.1109/ACCESS.2018.2852563.

A. Arif, P. Mandarani, and M. Tenik Informatika, “REKAYASA PERANGKAT LUNAK KRIPTOGRAFI MENGGUNAKAN ALGORITMA ADVANCED ENCRYPTION STANDARD (AES) 128 BIT PADA SISTEM KEAMANAN SHORT MESSAGE SERVICE (SMS) BERBASIS ANDROID,” vol. 4, no. 1, 2016.

Downloads

Published

2023-01-06

Issue

Section

Articles