Implementasi Metode Zig-Zag Chiper Dan ROT13 Untuk Kerahasiaan Basis Data
DOI:
https://doi.org/10.54066/jpsi.v1i3.687Keywords:
Data Base, Confidentiality, Text, Zig-zag Chiper, ROT13Abstract
Databases are widely used to store and manage data and information. despite the fact that database security is very important because data can be stolen from database without any security. The topic in this article contains the Implementation of Zig-Zag Cipher and Rot13 Methods for Database Confidentiality. Research objectives of the article The objectives of this research are as follows; Applying the secrecy of text contents to data in the database, Applying the Zig-Zag Cipher and ROT13 methods for secrecy of database text contents, Generating Applications for Implementation of the Zig-Zag Cipher and ROT13 Methods for Confidentiality of Data in the Database. The research method used is a qualitative method which collects information using books, journals, etc. in the form of literature and applies it to software and hardware. The results of the study using the application of the implementation of the Zig-Zag Cipher and ROT13 methods for database data confidentiality can apply text content secrecy to data in the database. By using the text data from the database and the specified key, then the text data from the database and key are converted to ASCII so that you can then apply the Zig-Zag Cipher and ROT13 methods for the confidentiality of the contents of the database text.
References
Firdaus, M, R., & Waluyo, S (2018). SISTEM KEAMANAN CHAT BERBASIS WEB MENGGUNAKAN ALGORITMA ZIG ZAG STUDI KASUS: NOKTURNAL MOTOSHOP. SKANIKA, 1(1), 166-172.
Hariati, A , Hardiyanti, K & Putri, W. E. (2018). Kombinasi Algoritma Playfair Chiper Dengan Metode Zig-Zag Dalam Penyandian Teks, Sinkron: jurnal dan penelitian teknik informatika, 2(2), 13-17.
Helmund, E. (2021). Optimasi Basis Data Oracle Menggunakan Complex View Studi Kasus: PT. Berkat Optimis rmatika, 7(01).
Hendrik, H. (2020). Kombinasi Algoritma Huffman dan Algoritma ROT 13 Dalam Pengamanan File Docx. Journal of Information System Research (JOSH), 2(1), 40-46.
Hondro, R. K. (2018). Aplikasi Enkripsi Dan Dekripsi Sms Dengan Algoritma Zig Zag Cipher Pada Mobile Phone Berbasis Android.
Kraugusteeliana, K., & Matondang, N. H. (2021). Desain Database Pengelolaan Administrasi Pada Internship And Research Application System Bagi Para Pelajar Di Kementrian Komunikasi Dan Informatika (Kominfo). Senamika, 2(1), 99-111.
Oktaviani, N., & Sauda, S. (2019). Pemodelan dan Implementasi Aplikasi Mobile Umrah Guide Menggunakan Unified Modeling Language. Jurnal Sains dan Informatika, 5(2), 177-186.
Pramudya, E. R., Hatmi, M. B., Susanto, A., Mulyono, I. U. W., & Muslih, M. (2020, December). KOMBINASI ALGORITMA ROT13 DAN ZIG-ZAG CHIPER PADA ALAMAT DIRECTORY FILW UNTUK KEAMANAN DOKUMEN. In PROSIDING SEMINAR NASIONAL LPPM UMP (pp. 548-555).
Putri, R. E. (2018). Perancangan Aplikasi Rekam Medis Menggunakan Bahasa Pemrograman VB. Net 2010. JurnalTeknik dan Informatika, 5(2), 49-55.
Rachmawati, D., Budiman, M. A., & Lubis, R. S. (2018, November). A hybrid cryptosystem based on zig-zag algorithm and Rivest Shamir Adleman (RSA) algorithm. In IOP Conference Series: Materials Science and Engineering (Vol. 434, No. 1, p. 012046). IOP Publishing.
Sanjaya, A. (2021). REKAYASA PERANGKAT LUNAK PERHITUNGAN HARGA POKOK PRODUKSI METODE FULL COSTING PADA UMKM MITRA CAKE DI BANDAR LAMPUNG. Jurnal Informasi dan Komputer, 9(2), 154-162.
Suheri, A. (2018). KEAMANAN FILE DENGAN TEKNIK ZIGZAG DAN HUFFMAN. Media Jurnal Informatika, 9(2).
Siswati, S., & Dindasari, D. A. (2019). Tinjauan Aspek Keamanan dan Kerahasiaan Rekam Medis di Rumah Sakit Setia Mitra Jakarta Selatan. Jurnal Rekam Medis dan Informasi Kesehatan, 2(2), 91-99.
Yani, R. R., Ariyani, F., & Rusminto, N. E. (2020). PENGEMBANGAN SKENARIO PEMBELAJARAN TEKS NARASI DENGAN MODEL DISCOVERY LEARNING UNTUK SISWA SMP KELAS VII. Jurnal Kata (Bahasa, Sastra, dan Pembelajarannya), 8(1 Ap).
Yazid, M. F., & Haryanto, E. V. (2021). Perancangan Aplikasi Penyandian File Teks Dengan Menggunakan Algoritma ROT13 Dan Rail Fence Cipher. Jurnal VOI (Voice Of Informatics), 10(2), 65-76.