Implementasi Teknik Enkripsi Q-Chiper Pada Keamanan Data Transkrip Nilai Siswa

Khairun Nathassa, Imam Saputra, Rivalri Kristianto Hondro

Abstract


Value transcripts often occur when very important data is still done manually because it still has weaknesses, so the value transcripts are easily copied and printed by irresponsible parties, resulting in the application of incorrect values or transcripts or value transcripts whose contents have been engineered. If users do not use a good security system, they will be exposed to security attacks by using the wrong encryption.One of the solutions to the above problems is to encode the transcript data so that its confidentiality can be protected. One of the algorithms that can be applied is the Q-cipher algorithm. By applying the Q-chiper algorithm, the transcript data can be protected from irresponsible parties and can run well and the transcript data can only be accessed by users who have access rights to process the value transcript data.

Keywords


Transcript; Cryptograph; Algorithm; Q-chiper implementation

Full Text:

PDF

References


I. M. . Christie Endly, Sediyono Eko, M. A. Pakereng, “Verifikasi Otentikasi Data Transkrip Nilai Berbentuk Citra,†p. 512, [Online]. Available: http://jurnal.unikom.ac.id/_s/data/jurnal/v08-n01/volume-81-artikel-9.pdf/pdf/volume-81-artikel-9.pdf.

M. Rath and P. Mäder, “Request for comments,†no. 1996, pp. 1414–1417, 2020, doi: 10.1145/3341105.3374056.

J. A. Hutabarat, “Implementasi Kriptografi Hibrida Dan Steganografi Ihwt Dalam Pengamanan Data Teks,†J. Pelita Inform., vol. 8, no. 3, pp. 340–343, 2020.

L. Keliher, L. Keliher, H. Meijer, and S. Tavares, “Lambung Linier Probabilitas Tinggi di Q Machine Translated by Google Lambung Linier Probabilitas Tinggi di Q,†2013.

H. Adiyasa, P. S. Wasito, and A. Satriyo, “Implementasi Algoritma Kriptografi dengan S-Box Dinamis Bergantung Pada Kunci Utama Berbasis Advanced Encryption Standard (AES),†Semin. Nas. Ilmu Komput. Undip 2014, pp. 15–23, 2014.

T. Rahajoeningroem and M. Aria, “Studi dan Implementasi Algoritma RSA untuk pengamanan Data transkip Mahasiswa,†Maj. Ilm. Unikom, vol. 8, no. 1, pp. 77–90, 2011, [Online]. Available: http://jurnal.unikom.ac.id/_s/data/jurnal/v08-n01/volume-81-artikel-9.pdf/pdf/volume-81-artikel-9.pdf.

R. W. Simbolon, A. Mbp, M. Jurusan, and M. Informatika, “Pengamanan Transkrip Nilai Mahasiswa Menggunakan Kriptografi Playfair Cipher Dan Steganografi Dengan Teknik Least Significant Bit (Lsb) Protecting the Student Academic Transcript Using Playfair Cipher Cryptography and Steganography With the Least Signific,†vol. 5, no. 1, pp. 59–70, 2016.

R. S. Puji Sutan, A. C. Prihandoko, and D. M. Firmansyah, “Analisis Perbandingan Kinerja Algoritma Kriptografi Serpent dan Twofish pada Dataset ‘World Bank Projects and Operations,’†Berk. Sainstek, vol. 8, no. 3, p. 65, 2020, doi: 10.19184/bst.v8i3.15805.

T. Ashur, “On Linear Hulls and Trails,†no. March, 2018, doi: 10.1007/978-3-319-49890-4.

P. Studi, T. Informatika, P. Negeri, and B. Android, “IMPLEMENTASI ALGORITMA RSA DAN QR CODE UNTUK KEAMANAN TRANSKRIP NILAI DI POLITEKNIK NEGERI LHOKSEUMAWE,†vol. 1, no. 2, pp. 28–34, 2016.

S. Informasi et al., “Seminar Nasional Ilmu Komputer ( SNAIK 2013 ), Samarinda , 30 November DENGAN METODE FUSION,†no. September 2016, 2013, doi: 10.13140/RG.2.2.18304.23041.

Asiyanik, “Studi Terhadap Advanced Encryption Standard (Aes) DanAlgoritma Knapsack Dalam Pengamanan Data,†Santika, vol. 7, no. Jurnal Ilmiah Sains dan Teknologi, pp. 553–561, 2017.




DOI: https://doi.org/10.30865/komik.v6i1.5777

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Khairun Nathassa, Imam Saputra, Rivalri Kristianto Hondro

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)
P3M STMIK Budi Darma
Sekretariat Jln. Sisingamangaraja No. 338 Telp 061-7875998
email: komik@univ-bd.ac.id, komik.budidarma@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.