Kriptografi dan Penerapannya Dalam Sistem Keamanan Data

Authors

  • Nanda Amalya Nanda a:1:{s:5:"en_US";s:3:"Nan";}
  • Santa Maria Sopiana Silalahi STIKOM TUNAS BANGSA PEMATANGSIANTAR
  • Della Fatricia Nasution STIKOM TUNAS BANGSA PEMATANGSIANTAR
  • Melia Sari STIKOM TUNAS BANGSA PEMATANGSIANTAR
  • Indra Gunawan STIKOM TUNAS BANGSA PEMATANGSIANTAR

DOI:

https://doi.org/10.55338/jumin.v4i2.428

Keywords:

Kriptografi, Enkripsi, Dekripsi, Keamanan Data, Chiper

Abstract

An understanding of what cryptography is, to understand cryptography and how it is applied in data security, so that data will be safer and more protected from spamming or illegal hacking of information. Observations of cryptography and its application to data security are carried out using the Approach of Literary Studies. Library Studies is a data collection technique by studying various reference books and the results of previous similar research, which is useful for obtaining a theoretical foundation on the problem to be studied. Cryptography is a technique of conveying messages in a hidden manner by utilizing data encryption features, which serve to secure data, whether transferred through a computer network or not, which is very useful for protecting, privacy, data integrity, authentication, and non-repudiation. Nowadays the use of cryptography has begun to be widely used in everyday life. Use cryptographic systems for the security of your data when accessing information.

Downloads

Download data is not yet available.

References

R. Dea Mustika, A. Zakir, and A. Rizmi, “IMPLEMENTASI ALGORITMA K-MEANS UNTUK CLUSTERING JUDUL SKRIPSI UNIVERSITAS HARAPAN MEDAN,” J. Media Inform., vol. 4, no. 1, pp. 40–47, Nov. 2022, doi: 10.55338/jumin.v4i1.405.

S. P. Lestari, H. N. Fadlan, R. Angelia Purba, and I. Gunawan, “REALISASI KRIPTOGRAFI PADA FITUR ENKRIPSI END-TO-END PESAN WHATSAPP,” J. Media Inform., vol. 4, no. 1, pp. 1–8, Nov. 2022, doi: 10.55338/jumin.v4i1.423.

J. H. Sinaga, M. Pangaribuan, I. Rivaldo, and I. Gunawan, “Penerapan Enkripsi Dan Deskripsi Menggunakan Algoritma Data Encryption Standart (DES) Dengan Pemograman Matlab,” vol. 4, 2022.

P. A. M. Z. R.W.P.P.Zer and I. Gunawan, “Penerapan Data Mining Naïve Bayes Dalam Klasifikasi Kepuasan Mahasiswa Berlangganan WiFi Indihome,” J. Media Inform., vol. 3, no. 2, pp. 112–118, Jun. 2022, doi: 10.55338/jumin.v3i2.488.

N. D. Farhanah, “Optimalisasi Penentuan Kinerja Perawat Terbaik di Klinik Amanah dengan Sistem Pendukung Keputusan dan Metode Simple Additive Weighting,” vol. 2, 2023.

B. Sapriatin and F. A. Sianturi, “Penerapan Teorema Bayes Mendeteksi Stunting pada Balita,” vol. 3, 2021.

A. Suaib and I. I. Tritosmoro, “Perbandingan Performa Metode Local Binary Pattern dan Random Forest dalam Identifikasi COVID-19 pada Citra X-ray Paru-paru.,” vol. 2, 2023.

D. E. Frans, “Peningkatan Produksi Budidaya Perikanan dengan Penerapan Algoritma Apriori dan Association Rule,” vol. 2, 2023.

N. Hafizar, E. R. Syahputra, and D. Irwan, “Desain Dan Penerapan Sistem Informasi Untuk Pemasaran Biji Kopi Dan Bubuk Kopi Arabika Berbasis Android,” vol. 4, 2022.

A. Simangunsong, R. M. Simanjorang, and H. Fahmi, “Penerapan Metode Composite Performance Index Dalam Seleksi Penerimaan Calon Laboran,” vol. 1, 2022.

Downloads

Published

2023-06-09

How to Cite

Nanda, N. A., Silalahi, S. M. S., Fatricia Nasution, D., Sari, M., & Gunawan, I. (2023). Kriptografi dan Penerapannya Dalam Sistem Keamanan Data. Jurnal Media Informatika, 4(2), 90-93. https://doi.org/10.55338/jumin.v4i2.428