Penggunaan Algoritma Vigenere Cipher dan RSA (Rivest-Shamir-Adleman) Untuk Keamanan Data Pembelian di PT Lamongan Marine Industry
Abstract
Purchasing data is very important for business actors because the data is very influential on companies, especially in the field of production and marketing. Therefore, the purchase data is one of the things that is kept secret by the business actors, such as PT Lamongan Marine Industry. With current technology hackers can easily hack such data, so the use of cryptography is a very appropriate solution to this problem. In this study the authors used the Vigenere Cipher algorithm and the RSA algorithm with a high security key. The hacker was not easy to find out the contents of the data. The data obtained is a purchase order, then presented in tabular form. The data is then encrypted and decrypted so that the comparison of the two algorithms is known. The results of the analysis state that the Vigenere Cipher algorithm is more effective in both encryption and decryption processing time. Ciphertext generated from the encryption process of the Vigenere Cipher algorithm is mostly in the form of punctuation, while the ciphertext generated by the RSA algorithm from the encryption process is mostly in alphabetical letters. The ciphertext generated by the RSA algorithm depends on the value of the modulo. but in terms of security the RSA algorithm is superior to the Vigenere Cipher algorithm.
References
[2] A. Pudoli, A. Muchbarak, and S. H. Farham Harvianto, “Keamanan Data Pada File Excel Dengan Menggunakan Vigenere Cipher.” Mei, 2014.
[3] S. A. Fauji, M. S. Pradana, and N. A. Azhari, “Penerapan Kode Huffman Pada Algoritma RSA (Rivest-Shamir-Adleman) Untuk Menyandikan Password Email,” Unisda J. Math. Comput. Sci., vol. 2, no. 1, pp. 41–49, 2016.
[4] D. N. Permata, L. Lambey, and S. Tangkuman, “Analisis Penerapan Sistem Informasi Akuntansi Pembelian Suku Cadang Pada Pt. Hasjrat Abadi Sudirman Manado,” Going Concern J. Ris. Akunt., vol. 12, no. 2, 2017.
[5] F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Inform. Mulawarman J. Ilm. Ilmu Komput., vol. 10, no. 1, pp. 20–31, 2016.
[6] T. Cahyadi, “Implementasi steganografi LSB dengan enkripsi vigenere cipher pada citra JPEG,” Transient J. Ilm. Tek. Elektro, vol. 1, no. 4, pp. 281–288, 2012.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish in UJMC (Unisda Journal of Mathematics and Computer Science) agree to the following terms:
1.Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
3.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.