Kombinasi Algoritma Kriptografi Vigenere Cipher dan SHA256 untuk Keamanan Basis Data

 (*)Rian Oktafiani Mail (Universitas Teknologi Yogyakarta, Sleman, Indonesia)
 Erik Iman Heri Ujianto (Universitas Teknologi Yogyakarta, Sleman, Indonesia)
 Rianto Rianto (Universitas Teknologi Yogyakarta, Sleman, Indonesia)

(*) Corresponding Author

Submitted: January 25, 2023; Published: March 31, 2023

Abstract

An organization must consider and manage the security of data storage in databases or databases, and special procedures are needed to protect data from various security risks. The problem in this study is that the population data contained in the Girisuko village administrative service information system has not been encrypted or secured. This can pose a risk that the data stored in the database can be intercepted and misused. In this study, the cryptographic technique used was a combination of the Vigenere Cipher and SHA 256 algorithms to secure or encrypt databases, especially population data in the Girisuko village administrative service information system. The text in the database is encrypted using the Vigenere Cipher, and SHA-256 is used to generate a hash value or a random value that is different from the text in the database. Messages will be encrypted using the Vigenere Cipher and then hashed with SHA-256 simultaneously. As a result, it will be difficult for an attacker to decrypt the text stored in the database because they have to break the Vigenere Cipher encryption, and also have to solve the hash value generated using SHA-256. This combination aims to increase security and maintain the confidentiality of messages from attackers. The application of the Vigenere Cipher and SHA to the village administration service information system application with a real-time database works well, as evidenced by the fast running-time of 0.39 seconds the data encryption process uses the Vigenere Cipher with 894,968 keys/second and an analyzed key length of 7 characters then text on population database successfully secured. By conducting this research, it is hoped that it can contribute to improving database system security.

Keywords


Security; Database; Cryptography; Vigenere Cipher; Hash Function

Full Text:

PDF


Article Metrics

Abstract view : 1395 times
PDF - 928 times

References

M. Sari, H. D. Purnomo, and I. Sembiring, “Review : Algoritma Kriptografi Sistem Keamanan SMS di Android,” Journal of Information Technology, vol. 2, no. 1, pp. 11–15, Mar. 2022, doi: 10.46229/jifotech.v2i1.292.

F. Husaini, A. Pardede, and I. Gultom, “Penerapan Enkripsi Menggunakan Metode Elgamal guna Meningkatkan Keamanan Data Text dan Gambar,” JUKI: Jurnal Komputer dan Informatika, vol. 4, no. 1, pp. 55–61, May 2022, doi: https://doi.org/10.53842/juki.v4i1.104.

S. R. Ningsih et al., Perancangan Basis Data, 1st ed. Yayasan Kita Menulis, 2022.

A. M. Dirgayusari, N. Ahmad, B. T. Mahardika, Musyrifah, and H. Gemasih, Basis Data, 1st ed., vol. 1. Tangerang: Media Sains Indonesia, 2022.

H. Bancin, M. A. Panjaitan, S. Putri, and A. B. Nasution, “Implementasi Kriptografi dengan Metode Caesar Chiper untuk Mengamankan Data File di Javanetbeans,” Jurnal Pendidikan Sains dan Teknologi, vol. 2, no. 1, pp. 17–21, Jan. 2023, doi: https://doi.org/10.47233/jpst.v2i1.438.

K. Andrea, A. Wardana, B. S. Wanandi, and A. Ikhwan, “Penerapan Kriptografi Caesar Cipher Pada Fitur Aplikasi Chatting Whatsapp,” JPPIE: Jurnal Hasil Penelitian dan Pengkajian Ilmiah Eksakta, vol. 2, no. 1, pp. 6–11, Jan. 2023, doi: https://doi.org/10.47233/jppie.v2i1.660.

D. K. Maulana, S. M. Tanjung, R. S. Ritonga, and A. Ikhwan, “Penerapan Kriptografi Vigenere Cipher Pada Kekuatan Kata Sandi,” Jurnal Sains dan Teknologi (JSIT), vol. 3, no. 1, pp. 47–52, Jan. 2023, doi: https://doi.org/10.47233/jsit.v3i1.483.

M. R. Zulfikar and S. Mulyati, “Penerapan Kriptografi Caesar Cipher Dan Vigenere Cipher Untuk Mengamankan Database Barang Belting Pada PT. Multi Mitra Usaha Bersama. Senafti : Seminar Nasional Mahasiswa Fakultas Teknologi Informasi,” in Prosiding Seminar Nasional Mahasiswa Fakultas Teknologi Informasi (SENAFTI), Sep. 2022, pp. 402–410. Accessed: Jan. 22, 2023. [Online]. Available: https://senafti.budiluhur.ac.id/index.php/senafti/article/view/471

L. B. Handoko and C. Umam, “Kombinasi Vigenere-Aes 256 dan Fungsi Hash Dalam Kriptografi Aplikasi Chatting,” Prosiding Sains Nasional dan Teknologi, vol. 12, no. 1, p. 390, Nov. 2022, doi: 10.36499/psnst.v12i1.7068.

D. Astuti and C. Sundari, “Sistem Keamanan Data Obat dengan Implementasi Algoritma Vigenere Cipher pada Puskesman Mertoyudan I Magelang,” in Prosiding Seminar Nasional STIE AAS, Dec. 2022, pp. 145–156. Accessed: Feb. 28, 2023. [Online]. Available: https://prosiding.stie-aas.ac.id/index.php/prosenas/article/view/202

I. Saputra and S. D. Nasution, “Perbandingan Performa Algoritma Md5 Dan SHA-256 Dalam Membangkitkan Identitas File,” Jurnal Sains Komputer dan Informatika (J-SAKTI), vol. 5, no. 2, pp. 240–254, Mar. 2022, doi: http://dx.doi.org/10.30645/j-sakti.v6i1.435.

N. Rismawati and M. F. Mulya, “Analisis dan Perancangan Simulasi Enkripsi dan Dekripsi pada Algoritma Steganografi untuk Penyisipan Pesan Text pada Image menggunakan Metode Least Significant Bit (LSB) Berbasis Cryptool2,” Faktor Exacta, vol. 12, no. 2, p. 132, Jul. 2019, doi: 10.30998/faktorexacta.v12i2.3527.

M. A. Ruswandi and W. Windarto, “Enkripsi Database Sistem Informasi Helpdesk Dengan Algoritme Kriptografi Aes-128 Dan Vigenere Chiper,” SKANIKA, vol. 5, no. 2, pp. 240–254, Jul. 2022, doi: 10.36080/skanika.v5i2.2957.

A. Y. Suseno, N. Sulistiyowati, and P. -, “Analisis Peningkatan hybrid Cryptosystem Untuk Enkripsi dan Dekripsi Menggunakan Vigenere Cipher dan RSA Pada Text,” STRING (Satuan Tulisan Riset dan Inovasi Teknologi), vol. 6, no. 2, p. 142, Dec. 2021, doi: 10.30998/string.v6i2.10309.

Megawati, Muhammad Fitra Hamidy, Sasqia Ismi Aulia, Yuhendri Putra, and Mhd Arief Hasan, “Enkripsi dan Deskripsi File Menggunakan Kombinasi Vigenere dan Shift Cipher di Python,” SATIN - Sains dan Teknologi Informasi, vol. 7, no. 1, pp. 102–111, Jun. 2021, doi: 10.33372/stn.v7i1.686.

I. Surya Permana, T. Hidayat, and R. Mahardiko, “Raw Data Security By Using Elgamal And Sha 256 Public Key Algorithm,” TEKNOKOM, vol. 4, no. 1, pp. 1–6, Apr. 2021, doi: 10.31943/teknokom.v4i1.53.

I. Rahim, N. Anwar, A. M. Widodo, K. Karsono Juman, and I. Setiawan, “Komparasi Fungsi Hash Md5 Dan Sha256 Dalam Keamanan Gambar Dan Teks,” ikraith-informatika, vol. 7, no. 2, Nov. 2022, doi: 10.37817/ikraith-informatika.v7i2.2249.

Z. Panjaitan, E. F. Ginting, and Y. Yusnidah, “Modifikasi SHA-256 dengan Algoritma Hill Cipher untuk Pengamanan Fungsi Hash dari Upaya Decode Hash,” Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer), vol. 19, no. 1, p. 53, Feb. 2020, doi: 10.53513/jis.v19i1.225.

H. Herman, R. Wijaya, K. Farandi, S. Mihaja, and Wilson, “Implementasi Algoritma Aes-128 Dan Sha-256 Dalam Perancangan Aplikasi Pengamanan File Dokumen,” Jurnal Times, vol. 10, no. 2, pp. 80–87, Jan. 2021, Accessed: Feb. 28, 2023. [Online]. Available: https://ejournal.stmik-time.ac.id/index.php/jurnalTIMES/article/view/666

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Rian Oktafiani, Erik Iman Heri Ujianto, Rianto Rianto

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Jurnal Sistem Komputer dan Informatika (JSON)
Dikelola oleh STMIK Budi Darma
Sekretariat : Jln. Sisingamangaraja No. 338 Telp 061-7875998
email : jurnal.json@gmail.com


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.