Pengamanan Data Arsip Pada Balai Desa Sidodadi Menggunakan Kriptografi Modern RC4
Keywords:Cryptography; Archived Data; Encryption; Decryption; RC4
The issue of data security and confidentiality is very important at the Village Hall. The Village Hall has many confidential documents such as population data and other data. Confidential documents or data should not be known by outside parties because they can cause harm to village officials and government. To secure the data, the RC4 algorithm is used. The RC4 algorithm was chosen because the processing time is faster than other algorithms. The RC4 algorithm uses two Substitution Boxes (S-Box), namely an array of 256 lengths containing permutations from 0 to 255, and the second S-Box containing permutations is a function of a variable length key.Cryptography
D. Wirdasari, Prinsip Kerja Kriptografi dalam Mengamankan Informasi, vol. 5, no. 2, 2008.
Janner Simarmata, (2006). Pengamanan Sistem Komputer.
Karina Novita Suryani, (2009). Algoritma RC4 Sebagai Metode Enkripsi. Makalah IF2091 STRUKTUR DISKRIT.
Sulindawati, & Fathoni, M. (2010). Pengantar Analisa Perancangan Sistem. Jurnal SAINTIKOM Vol.9 No.2.
Rossa A.S, M.Shalahuddin, (2014). Rekayasa Perangkat Lunak dan Berorientasi Objek. Bandung Informatika.
Deliarnoor Nandang Alamsyah, (2014). Aspek Hukum Dalam Kearsipan.
Arianto, (2016). Pengertian File Extension disetiap Nama File.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Pengamanan Data Arsip Pada Balai Desa Sidodadi Menggunakan Kriptografi Modern RC4
Copyright (c) 2021 Khairul Fahmi
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).