Javascript must be enabled to continue!
Implementasi Algoritma Merkle Hellman untuk Keamanan Database
View through CrossRef
The development of information technology today has a huge impact, namely the issue of security and confidentiality of data. One solution that can be used to guarantee the confidentiality and security of information is cryptography. By using cryptography, a data can be secured through the decryption and encryption process. Security issues and database confidentiality are the most important aspects of an information system. One mechanism to improve database security is to use asymmetric algorithms such as the Merkle Hellmen algorithm. Merkle Hellman is one of the crypto systems that uses the key type of asymmetry. In the Merkle Hellman system, the keys used are 2 different keys, namely the public key and the secret key. Encryption generates ciphertext and decryption produces a plaintext for securing databases that want to be kept confidential. The advantages of this Merkle Hellman algorithm is that there is no need for confidentiality in the key distribution process. From the results of experiments that have been done with this application, the encrypted database becomes a form of message that cannot be understood (ciphertext), but after the decryption process is done, the database is successfully returned to its original form (plaintext) that can be understood
Universitas Katolik Santo Thomas
Title: Implementasi Algoritma Merkle Hellman untuk Keamanan Database
Description:
The development of information technology today has a huge impact, namely the issue of security and confidentiality of data.
One solution that can be used to guarantee the confidentiality and security of information is cryptography.
By using cryptography, a data can be secured through the decryption and encryption process.
Security issues and database confidentiality are the most important aspects of an information system.
One mechanism to improve database security is to use asymmetric algorithms such as the Merkle Hellmen algorithm.
Merkle Hellman is one of the crypto systems that uses the key type of asymmetry.
In the Merkle Hellman system, the keys used are 2 different keys, namely the public key and the secret key.
Encryption generates ciphertext and decryption produces a plaintext for securing databases that want to be kept confidential.
The advantages of this Merkle Hellman algorithm is that there is no need for confidentiality in the key distribution process.
From the results of experiments that have been done with this application, the encrypted database becomes a form of message that cannot be understood (ciphertext), but after the decryption process is done, the database is successfully returned to its original form (plaintext) that can be understood.
Related Results
ARTIKEL ALGORITMA PEMROGRAMAN SERI MINTA UBA HASIBUAN
ARTIKEL ALGORITMA PEMROGRAMAN SERI MINTA UBA HASIBUAN
Algoritma merupakan akar dari sebuah sistem yang terbentuk dalam dunia pemrograman.Melalui serangkaian cara yang masuk akal dan teratur, sebuah algoritma dapat menyelesaikan suatu ...
Analisis Perbandingan Algoritma Local Binary Patterns Histogram (LBPH) Dan Algoritma Convolutional Neural Network (CNN) Pada Sistem Pengenalan Wajah
Analisis Perbandingan Algoritma Local Binary Patterns Histogram (LBPH) Dan Algoritma Convolutional Neural Network (CNN) Pada Sistem Pengenalan Wajah
Dalam sistem pengamanan dan verifikasi digital, kata sandi sering digunakan tetapi memiliki kerentanan terhadap manipulasi dan pencurian. Untuk mengatasi masalah ini, metode altern...
Perbandingan Algoritma Kriptografi Modern dalam Melindungi Data Transmisi
Perbandingan Algoritma Kriptografi Modern dalam Melindungi Data Transmisi
Keamanan data transmisi merupakan aspek penting dalam sistem informasi modern seiring meningkatnya pertukaran data melalui jaringan terbuka. Berbagai ancaman seperti penyadapan, ma...
Implementasi Algoritma Elgamal dan kode HILL Untuk Keamanan Database
Implementasi Algoritma Elgamal dan kode HILL Untuk Keamanan Database
ABSTRAKPerkembangan dunia informasi saat ini semakin cepat memasuki berbagai bidang area, yang sedang berusaha memanfaatkan kecanggihan teknologi informasi masa kini. Masalah keama...
Perbandingan Algoritma Boruvka Dan Algoritma Sollin Pada Optimasi Kebutuhan Kabel Fiber Optik Universitas Bengkulu
Perbandingan Algoritma Boruvka Dan Algoritma Sollin Pada Optimasi Kebutuhan Kabel Fiber Optik Universitas Bengkulu
Optimasi adalah hal penting dalam suatu algoritma. Ini dapat menghemat kebutuhan dalam suatu kegiatan. Pada Minimum Spanning Tree, yang ingin dicapai adalah bagaimana semua vertexs...
Studi Perbandingan Implementasi Algoritma Boyer-Moore, Turbo Boyer-Moore, dan Tuned Boyer-Moore dalam Pencarian String
Studi Perbandingan Implementasi Algoritma Boyer-Moore, Turbo Boyer-Moore, dan Tuned Boyer-Moore dalam Pencarian String
String searching merupakan suatu proses yang umum dilakukan dalam proses-proses yang dilakukan komputer karena teks merupakan bentuk utama penyimpanan data. Terdapat beberapa macam...
KEAMANAN INTERNASIONAL KOLEKTIF DAN PERAN ORGANISASI REGIONAL
KEAMANAN INTERNASIONAL KOLEKTIF DAN PERAN ORGANISASI REGIONAL
Abstract Following the end of the Second World War, international community adopted International Collective Security system and institutionalized in the United Nations Charter. T...
PREDIKSI KUALITAS AIR MENGGUNAKAN ALGORITMA NAÃVE BAYES DAN RANDOM FOREST
PREDIKSI KUALITAS AIR MENGGUNAKAN ALGORITMA NAÃVE BAYES DAN RANDOM FOREST
Air sangat penting bagi kehidupan semua organisme termasuk manusia, tumbuhan, atau hewan. Kualitas air yang baik sangat penting, pencemaran air dapat menimbulkan risiko yang berbah...

