Penerapan Kriptografi Keamanan Data Nilai Leger Siswa SMK Islam Kunjang Menggunakan Algoritma Asimetris RSA
Keywords:
Cryptography, Data Security, RSA MethodAbstract
One of the most significant concerns in the field of education, and one that affects SMK Islam Kunjang, is information security. Every final exam, SMK Islam Kunjang regularly distributes file leger data—an excel file including the student scores with other schools. File-leger student grade data at SMK Islam Kunjang is susceptible to viral dissemination since people share files via email or Whatsapp. In order to prevent careless people from abusing the information in the leger file including student grades, SMK Islam Kunjang need a solution that can protect its secrecy. In this study, data on the Kunjang Islamic Vocational School students' score leger file was secured using the Rivest Shamir Adleman technique or RSA method. The most used public key encryption algorithm for protecting data is the RSA method. To generate the public and private keys, the method's performance involves selecting two random integers that will be used as keys. Critical student grade data may be encrypted and described with maximum security by utilizing the RSA asymmetric method in cryptography applications. This study demonstrates how well the RSA asymmetric approach maintains data security in the student scoreleger file at SMK Islam Kunjang.
Downloads
References
Firda Nurelia Syah Putri, Yudo Bismo Utomo, and Harso Kurniadi, “Analisa Celah Keamanan Pada Website Pemerintah Kabupaten Kediri Menggunakan Metode Penetration Testing Melalui Kali Linux,” Online, 2023.
S. Suhandinata, R. A. Rizal, D. O. Wijaya, P. Warren, and S. Srinjiwi, “ANALISIS PERFORMA KRIPTOGRAFI HYBRID ALGORITMA BLOWFISH DAN ALGORITMA RSA,” JURTEKSI (Jurnal Teknologi dan Sistem Informasi), vol. 6, no. 1, pp. 1–10, Dec. 2019, doi: 10.33330/jurteksi.v6i1.395.
Y. B. Utomo and D. Erwanto, “Analisa Teknik Steganografi dan Steganalysis Pada File Multimedia Menggunakan Net Tools dan Hex Editor,” 2019.
A. Prameshwari and N. P. Sastra, “Implementasi Algoritma Advanced Encryption Standard (AES) 128 Untuk Enkripsi dan Dekripsi File Dokumen,” Eksplora Informatika, vol. 8, no. 1, p. 52, 2018, doi: 10.30864/eksplora.v8i1.139.
B. Nuansyah, “Penerapan Kriptografi Dengan Algoritma Rivest Shamir Adleman (Rsa) Untuk Keamanan Pesan Text,” vol. 1, no. 16, pp. 1–12, 2021.
K. Andriani and B. H. Hayadi, “Pengamanan Data Penjualan Dengan Kriptografi Algoritma Rivest Shamir Adleman (Rsa) Pad a Toko Baju Family,” Journal of Science and Social Research, vol. 5, no. 3, p. 664, 2022, doi: 10.54314/jssr.v5i3.1018.
A. Khamsyar and Muh. Basri, “Aplikasi Enkripsi Gambar Menggunakan Metode (Rivest Shamir Adleman) Rsa,” Jurnal Sintaks Logika, vol. 2, no. 3, pp. 39–45, 2022, doi: 10.31850/jsilog.v2i3.1850.
Azlin, F. Musadat, and J. Nur, “Aplikasi Kriptografi Keamanan Data Menggunakan Algoritma Base64,” Jurnal Informatika, vol. 7, no. 2, pp. 1–5, 2018.
I. Gunawan, “Kombinasi Algoritma Caesar Cipher dan Algoritma RSA untuk pengamanan File Dokumen dan Pesan Teks,” InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan), vol. 2, no. 2, pp. 124–129, 2018, doi: 10.30743/infotekjar.v2i2.266.
A. Abdul Wahid, “Analisis Metode Waterfall Untuk Pengembangan Sistem Informasi,” Jurnal Ilmu-ilmu Informatika dan Manajemen STMIK, no. November, pp. 1–5, 2020.
N. Moch Bachrudin, Y. Bismo Utomo, and I. Kurniasari, “Perancangan Aplikasi E-Archive Untuk Penyimpanan Laporan Tugas Akhir (Studi Kasus: Fakultas Teknik Uniska Kediri),” 2023.
F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Informatika Mulawarman: Jurnal Ilmiah Ilmu Komputer, vol. 10, no. 1, p. 20, 2016, doi: 10.30872/jim.v10i1.23.
A. N. Agustina, Aryanti, and Nasron, “Pengamanan Dokumen Menggunakan Kombinasi Metode Rsa (Rivest Shamir Adleman) Dan Vigenere Cipher,” Prosiding Seminar Nasional Multi Disiplin Ilmu & Call For Papers UNISBANK, pp. 14–19, 2017.

Downloads
Published
Issue
Section
License
Copyright (c) 2024 Andryan Putra Hidayat Andryan, Yudo Bismo Utomo, Harso Kurniadi (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.