Implementasi Keamanan Data Menggunakan Algoritma Rivest Code 4 (RC4) Pada Sistem Informasi Inventory Stock Barang Pada Distributor PT.Wings Food

  • Susanto Susanto STMIK MUSIRAWAS

Abstract

Rivest code 4 (RC4) is a cryptographic algorithm modern symentic key which has an operating mode stream chipper. It’s used two substitutions box in processing data and information, they are array with a permutation length of 256 and second s-box as permutation with has a function as public key. Algorithm rivest code 4 was used for data encryption, message or information.  Information system inventory stock of goods at distributor PT. Wings Food is a system that processed incoming and outgoing goods data, so that the data stored in database must be guaranteed confidential and its secure. To keep the security of stock data items stored in database, it was combined with algorithm rivest code 4. Thus, the data encrypted in database would not be known the real meaning and was difficult to change or replaced. Symmetry key that was used for processing encryption and description rivest code 4 algorithm at information system inventory stock of goods in source code. Algorithm implementation rivest code 4 was made by programming language Hypertext Preprocessor and MySQL. Based on the result, the data displayed in database PT. Wings Food was encrypted, so it was found that the system could keep the data confidential in a secure. In short, the data displayed was unencrypted.

Downloads

Download data is not yet available.

References

[1] Basri, “Kriptografi Simetris Dan Asimetris Dalam Perspektif Keamanan Data Dan Kompleksitas Komputasi,” J. Ilm. Ilmu Komput., 2016.
[2] J. Pagik, “Pengertian Algoritma RC4,” 2014. [Online]. Available: https://matriasiyas.wordpress.com/2014/01/19/pengertian-algoritma-rc4/. [Accessed: 01-Jun-2017].
[3] A. A. I. A. D. Purnamaningrat, I. M. Sukarsa, and N. M. I. Marini, “Perancangan Sistem Informasi Manajemen Rumah Sakit Modul Sarana dan Prasarana,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 6, no. 2, pp. 73–83, 2015.
[4] S. Kosasi, “Penerapan Rapid Application Development pada Sistem Penjualan Sepeda Online,” J. Simetris, vol. 6, no. 1, pp. 27–36, 2015.
[5] R. Sadikin, Kriptografi untuk Keamanan Jaringan, 1st ed. Yogyakarta: AndiPublisher, 2012.
[6] W. H. Haji and S. Mulyono, “Implementasi Rc4 Stream Cipher Untuk Keamanan Basis Data,” Implementasi Rc4 Stream Cipher Untuk Keamanan Basis Data, 2012.
[7] D. Hostiadi and I. B. Suradarma, “Implementasi Pengaman PGP pada Platform Zimbra Mail Serve,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 8, no. 1, pp. 41–52, 2017.
[8] W. Lestari, “Aplikasi Algoritma Kriptografi dan Steganografi Untuk Kemanan Informasi Berbasis Teks,” Politeknosains, vol. 15, no. 2, 2016.
[9] J. Enterprise, Belajar Java, Database, dan netBeans dari nol. Yogyakarta: Elex Media Komputindo, 2016.
[10] R. A.S and M. Shalahuddin, Rekayasa Perangkat Lunak. Bandung: Informatika, 2013.
[11] D. Abdullah and C. Erliana, “Perancangan Sistem Informasi Inventori Barang pada CV. Iltizam Cooperation,” Syntax, vol. 3, no. 1, 2014.
[12] A. Fitriya, M. Nurkamid, and T. Khotimah, “Sistem Inventori Barang Dengan Teknologi Ajax,” Simetris, vol. 6, no. 2, pp. 367–374, 2015.
[13] K. Indriani and Sudarmadi, “Sistem Inventory Alat Tulis Kantor (ATK) Menggunakan Metode Waterfall,” J. Techno Nusa Mandiri, vol. 12, no. 1, pp. 69–76, 2015.
Published
2017-08-06
How to Cite
SUSANTO, Susanto. Implementasi Keamanan Data Menggunakan Algoritma Rivest Code 4 (RC4) Pada Sistem Informasi Inventory Stock Barang Pada Distributor PT.Wings Food. Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, [S.l.], p. 77-88, aug. 2017. ISSN 2541-5832. Available at: <https://ojs.unud.ac.id/index.php/lontar/article/view/32085>. Date accessed: 21 nov. 2024. doi: https://doi.org/10.24843/LKJITI.2017.v08.i02.p02.
Section
Articles