Implementasi Algoritma Base64 Untuk Verifikasi Qr Code Login Jaringan Wifi Berbasis Android
DOI:
https://doi.org/10.30865/json.v2i1.2468Keywords:
Wifi, QR Code, Algorithm Base64Abstract
In this day and age many people use the internet with wifi media because its use is easy and efficient, in contrast to the use of network cables because of its inefficient use and consuming a lot of space. But now the use of wifi is widely accessed by unauthorized people to access it and insecure login verification process and the amount of access that uses wifi on one SSID will result in a decrease in internet speed on wifi, to enter and verify it into a wifi network. text and numbers or security using the QR Code. Using a QR Code or an ordinary password will not be able to deal with people who are not entitled to such access, so it needs layered security to secure and verify wifi logins from people who are not entitled to access them. Base64 algorithm is one of the algorithms for encoding and decoding a data into an ASCII format, which is based on basic numbers 64 or can be referred to as one method used to encode binary data. In securing wifi by verifying the QR Code login wifi network using the base64 algorithm makes using wifi can be overcome and handled so that no one breaks into the wifi network because it can harm the users or owners of the wifi networkReferences
N. F. Ginting and M. Ginting, “Perbandingan Kriptografi RSA dengan Base64,†vol. 02, no. 479, pp. 47–52, 2017.
Hasan, B. Sugiantoro, and Fuad, “Pengembangan Qr Code Scanner Berbasis Android Untuk Sistem Informasi Museum Sonobudoyo,†Pengembangab QR Code Scanner Berbas. Android untuk Sist. Inf. Museum Sonobudoyo Yogyakarta, vol. 12, no. 02, pp. 134–145, 2015.
I. Rahmayun, D. Jurusan, T. Informasi, and P. Negeri, “Enkripsi SMS ( SHORT MESSAGE SERVICE ) Pada Telepon Selular Berbasis Android Dengan Metode RC6,†J. Momentum, vol. 16, no. 1, pp. 63–73, 2014.
G. Setiawan, Implementasi dalam Birokrasi Pembangunan. 2004.
J. Unifikasi, D. Rahmat, F. Hukum, and U. Kuningan, “IMPLEMENTASI KEBIJAKAN PROGRAM BANTUAN HUKUM BAGI MASYARAKAT,†vol. 04, pp. 35–42, 2017.
E. Setyaningsih, Kriptografi & Implementasinya Menggunakan Matlab. 2015.
U. A. Dony Ariyus, Pengantar Ilmu Kriptografi: Teori Analisis & Implementasi. Penerbit Andi.
A. A. Ibrahim, “Perancangan Pengamanan Data Menggunakan Algoritma AES ( Advanced Encyption Standard ),†J. Tek. Inform. Stmik Antar Bangsa, vol. III, no. 1, pp. 53–60, 2017.
E. R. Agustina, A. Kurniati, L. S. Negara, P. Minggu, and J. Selatan, “Pemanfaatan Kriptografi Dalam Mewujudkan,†Semin. Nas. Inform. 2009 (semnasIF 2009), vol. 2009, no. semnasIF, pp. 22–28, 2009.
K. Kunci, “PEMBANGKIT KEY POLYALPHABETIC CIPHER PADA KRIPTOGRAFI SIMETRI MENGGUNAKAN JAVA Nuniek Fahriani, Yoedo Agung Suryo , Putri Aisyiyah R. Devi,†vol. 26, no. September, pp. 136–147, 2016.
H. Sismoro, Pengantar Logika Informatika, Algoritma, dan Pemrograman Komputer. yogyakarta: Penerbit Andi, 2005.
A. P. Nugraha and E. Gunadhi, “Penerapan Kriptografi Base64 Untuk Keamanan URL (Uniform Resource Locator) Website Dari Serangan SQL Injection,†J. Algoritm. Sekol. Tinggi Teknol. Garut, vol. 13, no. 1, pp. 491–498, 2016.
P. Kombinasi, A. Base, D. A. N. Rot, P. M. Ildrem, P. T. Informatika, and F. Teknik, “Penerapan kombinasi algoritma base64 dan rot47 untuk enkripsi database pasien rumah sakit jiwa prof. dr. muhammad ildrem,†pp. 146–151.
J. Rouillard, “Contextual QR Codes,†no. July 2008, 2014.
R. A. S.-M. Shalahudin, Rekayasa Perangkat Lunak (Arsitektur dan Berorientasi Objek). Bandung: Informatika bandung, 2014.
N. S. H, Pemrograman Aplikasi Mobile Smartphone Dan Tablet Pc Berbasis Android. Bandung: Informatika Bandung, 2012.
Android, “Versi Android,†Citra satelit: ©2014 Astrium, DigitalGlobe, 2014. [Online]. Available: https://www.android.com/. [Accessed: 07-Aug-2018].
Z. P.Juhara, Panduan Lengkap Pemograman Android. yogyakarta: ANDI OFFSET, 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).

