Implementasi Algoritma Mars Pada Penyandian Record Database
Database records in the form of text are very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of database records, it can be done by using cryptographic techniques. Cryptographic techniques can encode database records by encrypting them in the form of passwords that are not understood. The Mars algorithm is an algorithm that uses a 128-bit key and the encryption process consists of 32 rounds. This symmetry algorithm will produce a higher level of security against the database record because it can encode it into a password with a fairly complex process that will make it difficult for cryptanalysts to access the image. This research uses the Mars Algorithm for the encryption and decryption process, so that in the process it is necessary to go through several long steps in order to produce the final cipher. This research describes the process of securing a database record by encoding it based on the Mars algorithm, in the form of a password that is difficult for others to understand and understand. This is done in an effort to minimize acts of misuse of database records
Y. Yanti, Munawir, Zulfan, and Erdiwansyah, “Implementasi Sistem Keamanan Database Menggunakan Metode Triangle Chain,” Serambi Eng., vol. II, no. 4, 2017.
J. S. Komputer, N. R. Yanti, and D. A. Ritonga, “Implementasi Algoritma Data Encryption Standard Pada Penyandian Record Database,” no. 1, 2018.
T. Zebua, “TRIANGLE CHAIN PADA PENYANDIAN RECORD DATABASE ...,” Pelita Inform. Budi Darma, vol. 3, no. April, 2013.
M. Natsir, “Pengembangan Prototype Sistem Kriptografi Untuk Enkripsi Dan Dekripsi Data Office Menggunakan Metode Blowfish Dengan Bahasa Pemrograman Java,” vol. 6, 2017.
D. Sartika, “PENGEMBANGAN PERANGKAT LUNAK PENYEMBUNYIAN PESAN,” J. Ilm. Inform. Glob., vol. 7, no. 1, pp. 1–6, 2016.
Suprianto, “Pengantar Ilmu Kriptografi Teori Analisis Dan Implementasi,” J. Comput. Bisnis, vol. 1, no. 2, pp. 105–118, 2007.
M. Rinaldi, Kriptografi. Bandung: Informatika Bandung, 2006.
A. Dony, Pengantar Ilmu Kriptografi Teori Analisa dan Implementasi. Yogyakarta: ANDI, 2008.
D. Sartika, “Pengembangan Perangkat Lunak Penyembunyian Pesan Terenkripsi Menggunakan Algoritma Mars Pada Citra Digital Dengan Metode Adaptif,” vol. 7, no. 1, pp. 1–6, 2016.
T. Zebua, “TRIANGLE CHAIN PADA PENYANDIAN RECORD DATABASE ...,” Pelita Inform. Budi Darma, vol. 111, no. April, pp. 37–49, 2013.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).