Pengamanan Data Pelanggan dan Penjualan Menggunakan Implementasi Algoritma Kriptografi


Authors

  • Sri Vivi Wahdini STIKOM Tunas Bangsa, Pematangsiantar, Indonesia
  • Dedy Hartama STIKOM Tunas Bangsa, Pematangsiantar, Indonesia
  • Ika Okta Kirana STIKOM Tunas Bangsa, Pematangsiantar, Indonesia
  • Poningsih STIKOM Tunas Bangsa, Pematangsiantar, Indonesia
  • Sumarno AMIK Tunas Bangsa, Pematangsiantar, Indonesia

DOI:

https://doi.org/10.47065/jimat.v1i3.112

Keywords:

Security; Customer Data; Cryptography; RSA; Sales Data

Abstract

Data security is an important priority, as it relates to privacy, integrity, authentication, confidentiality, and customer and sales data. The confidentiality and security of customer and sales data is the most important thing in conducting business in the industrial 4.0 era, which is now all-digital. Therefore, the research objective in this paper is to secure customer data using the RSA (Rivest Shamir Adleman) cryptographic algorithm implementation. The strength and security of the RSA algorithm lie in the level of difficulty in factoring numbers into prime factors. The research in this paper uses customer data and car sales at PT. Sutan Indo Various Cars Pematangsiantar. Based on these data, a decryption encryption application will be built using the RSA algorithm. This RSA cryptographic algorithm uses a key length of 1024 bits and plaintext in the form of files with the extension Microsoft Office. The first step is to convert the plaintext and the key into hexadecimal form. The results showed that the length of the file used would affect the encryption and decryption process time. The longer the file size, the longer it will take for the encryption and decryption process. So it can be concluded that the RSA algorithm is effectively used to secure data that is not too large in file size.

Downloads

Download data is not yet available.

References

H. Agusta, “Keamanan dan Akses Data Pribadi Penerima Pinjaman Dalam Peer to Peer Lending di Indonesia,” Krtha Bhayangkara, vol. 15, no. 1, pp. 11–38, 2021.

R. B. Anjasworo, “Penerapan MD5 Pada Verifikasi dan Validasi Keaslian Data,” Kumpulan Karya Ilmiah Mahasiswa Fakultas sains dan Tekhnologi, vol. 1, no. 1, pp. 1–20, 2019.

T. S. Alasi, R. Wanto, and V. H. Sitanggang, “Implementasi Kriptografi Algoritma Idea Pada Keamanan Data Teks Berbasis Android,” Jurnal Informasi Komputer Logika, vol. 2, no. 1, pp. 1–4, 2021.

E. D. Hastri, “Cyber Espionage Sebagai Ancaman Terhadap Pertahanan dan Keamanan Negara Indonesia,” Law and Justice Review Journal, vol. 1, no. 1, pp. 12–25, 2021.

R. Raodia, “Pengaruh Perkembangan Teknologi Terhadap Terjadinya Kejahatan Mayantara (Cybercrime),” Jurisprudentie, vol. 6, no. 2, pp. 230–239, 2019.

I. J. Alfreda, R. R. Permata, and T. S. Ramli, “Pelindungan Dan Tanggung Jawab Kebocoran Informasi Pada Penyedia Platform Digital Berdasarkan Perspektif Rahasia Dagang,” Jurnal Sains Sosio Humaniora, vol. 5, no. 1, pp. 1–16, 2021.

M. R. Ramadhani and & A. R. Pratama, “Analisis Kesadaran Cyber Security Pada Pengguna Media Sosial Di Indonesia,” Jurnal Aotomata, vol. 3, no. 2, pp. 1–8, 2020.

N. Ma’rufah, H. K. Rahmat, and I. D. K. K. Widana, “Degradasi Moral Sebagai Dampak Kejahatan Siber Pada Generasi Millenial di Indonesia,” Nusantara: Jurnal Ilmu Pengetahuan Sosial, vol. 7, no. 1, pp. 191–201, 2020.

E. F. Pakpahan, K. Chandra, and A. Tanjaya, “Urgensi Pengaturan Financial Technology di Indonesia,” Jurnal Darma Agung, vol. 28, no. 3, pp. 444–456, 2020.

F. P. Nugroho, R. W. Abdullah, S. Wulandari, and Hanafi Hanafi, “Keamanan Big Data Di Era Digital di Indonesia,” Jurnal INFORMA, vol. 5, no. 1, pp. 28–34, 2019.

M. Fadlan, S. Sinawati, A. Indriani, and E. D. Bintari, “Pengamanan Data Teks Melalui Perpaduan Algoritma Beaufort dan Caesar Cipher,” Jurnal Teknik Informatika, vol. 12, no. 2, pp. 149–158, 2019.

A. Widarma, H. F. Siregar, and M. D. Irawan, “Teknik Keamanan Data Menggunakan Vigenere Cipher Dan Electronic Code Book (ECB),” J-SAKTI (Jurnal Sains Komputer dan Informatika), vol. 3, no. 2, p. 393, 2019.

L. L. A. Rahman, “Implikasi Diplomasi Pertahanan terhadap Keamanan Siber dalam Konteks Politik Keamanan,” Jurnal Diplomasi Pertahanan, vol. 6, no. 2, pp. 1–93, 2020.

K. A. Seputra and G. A. J. Saskara, “Kriptografi Simetris RC4 Pada Transaksi Online Booking Engine System,” Jurnal Pendidikan Teknologi dan Kejuruan, vol. 17, no. 2, pp. 286–295, 2020.

A. Vuppala, R. S. Roshan, S. Nawaz, and J. V. R. Ravindra, “An Efficient Optimization and Secured Triple Data Encryption Standard Using Enhanced Key Scheduling Algorithm,” Procedia Computer Science, vol. 171, no. 2019, pp. 1054–1063, 2020.

R. Donev, A. Alsadoon, P. W. C. Prasad, A. Dawoud, S. Haddad, and A. Alrubaie, “A novel secure solution of using mixed reality in data transmission for bowel and jaw surgical telepresence: enhanced rivest cipher RC6 block cipher,” Multimedia Tools and Applications, vol. 80, pp. 5021–5046, 2021.

V. S. Prajwal and K. V. Prema, “User Defined Encryption Procedure for IDEA Algorithm,” 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1668–1671, 2018.

B. Langenberg, H. A. I. Pham, and R. Steinwandt, “Reducing the Cost of Implementing the Advanced Encryption Standard as a uantum Engineering,” IEEE Transactions on Quantum Engineering, vol. 1, no. 2500112, pp. 1–12, 2020.

O. K. Sulaiman, K. Nasution, and S. Y. Prayogi, “Base64 Sebagai Kunci Keamanan pada One Time Pad (OTP),” CESS (Journal of Computer Engineering, System and Science), vol. 5, no. 2, p. 241, 2020.

N. Mehibel and M. Hamadouche, “A new enhancement of elliptic curve digital signature algorithm,” Journal of Discrete Mathematical Sciences and Cryptography, vol. 23, no. 3, pp. 743–757, 2020.

A. El Emine Sejad, K. Wane Keita, K. Tall, and I. Diop, “Proposal of a DH optimization model,” 2020 International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1–5, 2020.

M. M. Islam, M. S. Hossain, M. D. Shahjalal, M. K. Hasan, and Y. M. Jang, “Area-Time Efficient Hardware Implementation of Modular Multiplication for Elliptic Curve Cryptography,” IEEE Access, vol. 8, pp. 73898–73906, 2020.

T. Shang, Y. Tang, R. Chen, and J. Liu, “Full quantum one?way function for quantum cryptography,” Quantum Engineering, vol. 2, no. 1, pp. 1–11, 2020.

S. Ambika, S. Rajakumar, and A. S. Anakath, “A novel RSA algorithm for secured key transmission in a centralized cloud environment,” International Journal of Communication Systems, vol. 33, no. 5, pp. 1–9, 2020.

G. M. Nikolopoulos, “Cryptographic one-way function based on boson sampling,” Quantum Information Processing, vol. 18, no. 8, pp. 1–25, 2019.

Y. Anshori, A. Y. Erwin Dodu, and D. M. P. Wedananta, “Implementasi Algoritma Kriptografi Rivest Shamir Adleman (RSA) pada Tanda Tangan Digital,” Techno.Com, vol. 18, no. 2, pp. 110–121, 2019.

Ainafatul Nur Muslikah, H. R. Riswanto, K. Safinah, and K. F. H. Holle, “Implementasi Teknik Kriptografi Rsa Untuk Pengamanan Data Pengiriman Sms,” Jurnal Ilmiah Informatika, vol. 5, no. 1, pp. 61–66, 2020.

A. Cahya Putra, M. Simanjuntak, and Nurhayati, “Penerapan Algoritma Rivest Shamir Adleman (Rsa) Untuk Mengamankan Database Program Keluarga Harapan (PKH),” Jurnal Teknik Informatika Kaputama (JTIK), vol. 5, no. 1, pp. 76–84, 2021.

M. Nilai, S. Smp, and H. P. Bulan, “Penerapan Algoritma RSA ( Rivest Shamir Adelman ) Untuk Mengamankan Nilai Siswa SMP HKBP P. Bulan,” Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD (J-SISKO TECH), vol. 4, no. 1, pp. 88–91, 2021.

Sutejo, “Implementasi Algoritma Kriptografi RSA (Rivest Shamir Adleman) Untuk Keamanan Data Rekam Medis Pasien,” Journal of Information Technology and Computer Science (INTECOMS), vol. 4, no. 1, pp. 104–114, 1967.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Pengamanan Data Pelanggan dan Penjualan Menggunakan Implementasi Algoritma Kriptografi

Dimensions Badge

ARTICLE HISTORY

Published: 2021-07-31

Abstract View: 1745 times
PDF Download: 2014 times

Issue

Section

Articles