Penerapan Kriptografi Keamanan Data Nilai Leger Siswa SMK Islam Kunjang Menggunakan Algoritma Asimetris RSA

Authors

  • Andryan Putra Hidayat Andryan Universitas Islam Kadiri Kediri Author
  • Yudo Bismo Utomo Universitas Islam Kadiri Author
  • Harso Kurniadi Universitas Islam Kadiri Author

Keywords:

Cryptography, Data Security, RSA Method

Abstract

One of the most significant concerns in the field of education, and one that affects SMK Islam Kunjang, is information security. Every final exam, SMK Islam Kunjang regularly distributes file leger data—an excel file including the student scores with other schools. File-leger student grade data at SMK Islam Kunjang is susceptible to viral dissemination since people share files via email or Whatsapp. In order to prevent careless people from abusing the information in the leger file including student grades, SMK Islam Kunjang need a solution that can protect its secrecy. In this study, data on the Kunjang Islamic Vocational School students' score leger file was secured using the Rivest Shamir Adleman technique or RSA method. The most used public key encryption algorithm for protecting data is the RSA method. To generate the public and private keys, the method's performance involves selecting two random integers that will be used as keys. Critical student grade data may be encrypted and described with maximum security by utilizing the RSA asymmetric method in cryptography applications. This study demonstrates how well the RSA asymmetric approach maintains data security in the student scoreleger file at SMK Islam Kunjang.

Downloads

Download data is not yet available.

References

Firda Nurelia Syah Putri, Yudo Bismo Utomo, and Harso Kurniadi, “Analisa Celah Keamanan Pada Website Pemerintah Kabupaten Kediri Menggunakan Metode Penetration Testing Melalui Kali Linux,” Online, 2023.

S. Suhandinata, R. A. Rizal, D. O. Wijaya, P. Warren, and S. Srinjiwi, “ANALISIS PERFORMA KRIPTOGRAFI HYBRID ALGORITMA BLOWFISH DAN ALGORITMA RSA,” JURTEKSI (Jurnal Teknologi dan Sistem Informasi), vol. 6, no. 1, pp. 1–10, Dec. 2019, doi: 10.33330/jurteksi.v6i1.395.

Y. B. Utomo and D. Erwanto, “Analisa Teknik Steganografi dan Steganalysis Pada File Multimedia Menggunakan Net Tools dan Hex Editor,” 2019.

A. Prameshwari and N. P. Sastra, “Implementasi Algoritma Advanced Encryption Standard (AES) 128 Untuk Enkripsi dan Dekripsi File Dokumen,” Eksplora Informatika, vol. 8, no. 1, p. 52, 2018, doi: 10.30864/eksplora.v8i1.139.

B. Nuansyah, “Penerapan Kriptografi Dengan Algoritma Rivest Shamir Adleman (Rsa) Untuk Keamanan Pesan Text,” vol. 1, no. 16, pp. 1–12, 2021.

K. Andriani and B. H. Hayadi, “Pengamanan Data Penjualan Dengan Kriptografi Algoritma Rivest Shamir Adleman (Rsa) Pad a Toko Baju Family,” Journal of Science and Social Research, vol. 5, no. 3, p. 664, 2022, doi: 10.54314/jssr.v5i3.1018.

A. Khamsyar and Muh. Basri, “Aplikasi Enkripsi Gambar Menggunakan Metode (Rivest Shamir Adleman) Rsa,” Jurnal Sintaks Logika, vol. 2, no. 3, pp. 39–45, 2022, doi: 10.31850/jsilog.v2i3.1850.

Azlin, F. Musadat, and J. Nur, “Aplikasi Kriptografi Keamanan Data Menggunakan Algoritma Base64,” Jurnal Informatika, vol. 7, no. 2, pp. 1–5, 2018.

I. Gunawan, “Kombinasi Algoritma Caesar Cipher dan Algoritma RSA untuk pengamanan File Dokumen dan Pesan Teks,” InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan), vol. 2, no. 2, pp. 124–129, 2018, doi: 10.30743/infotekjar.v2i2.266.

A. Abdul Wahid, “Analisis Metode Waterfall Untuk Pengembangan Sistem Informasi,” Jurnal Ilmu-ilmu Informatika dan Manajemen STMIK, no. November, pp. 1–5, 2020.

N. Moch Bachrudin, Y. Bismo Utomo, and I. Kurniasari, “Perancangan Aplikasi E-Archive Untuk Penyimpanan Laporan Tugas Akhir (Studi Kasus: Fakultas Teknik Uniska Kediri),” 2023.

F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Informatika Mulawarman: Jurnal Ilmiah Ilmu Komputer, vol. 10, no. 1, p. 20, 2016, doi: 10.30872/jim.v10i1.23.

A. N. Agustina, Aryanti, and Nasron, “Pengamanan Dokumen Menggunakan Kombinasi Metode Rsa (Rivest Shamir Adleman) Dan Vigenere Cipher,” Prosiding Seminar Nasional Multi Disiplin Ilmu & Call For Papers UNISBANK, pp. 14–19, 2017.

Downloads

Published

2024-08-08

How to Cite

[1]
A. P. H. Andryan, Yudo Bismo Utomo, and Harso Kurniadi, “Penerapan Kriptografi Keamanan Data Nilai Leger Siswa SMK Islam Kunjang Menggunakan Algoritma Asimetris RSA”, neiit, vol. 1, no. 1, pp. 553–563, Aug. 2024, Accessed: Jul. 04, 2025. [Online]. Available: http://ojs.ft.uniska-kediri.ac.id/index.php/neiit/article/view/70

Most read articles by the same author(s)

Similar Articles

11-20 of 37

You may also start an advanced similarity search for this article.