Pengamanan Data Inventaris Menggunakan Algoritma Kriptografi Tripple DES dan RC4
Abstract
Data security is an essential aspect of information management, particularly inventory data, which includes assets, supplies, and logistics. If this data is misused, it can lead to financial and operational losses. This research develops an inventory data security system that utilizes the Triple Data Encryption Standard (Triple DES) and Rivest Cipher 4 (RC4) cryptographic algorithms. The system is capable of protecting the item name and price columns in the inventory, as well as providing a decryption feature for encrypted data. Additionally, the security of the application is strengthened through user authentication. Combining these two cryptographic algorithms offers an optimal security solution, considering system performance and speed without disrupting daily operations.
References
[2] A. Davy Wiranata dan R. Tamara Aldisa, “Aplikasi Steganografi Menggunakan Least Significant Bit (LSB) dengan Enkripsi Caesar Chipper dan Rivest Code 4 (RC4) Menggunakan Bahasa Pemrograman JAVA,” J. JTIK (Jurnal Teknol. Inf. dan Komunikasi), vol. 5, no. 3, hal. 4–8, 2021, [Daring]. Tersedia pada: http://journal.lembagakita.org/index.php/jtik/article/view/219/pdf
[3] B. Noviansyah, “Modifikasi Pembentukan Algoritma Rc4 Cipher Dengan Metode Acak Mid-Square Technique Untuk Pengamanan Voice Chat,” J. Sains dan Teknol. Inf., vol. 2, no. 1, hal. 26–30, 2022, doi: 10.47065/jussi.v2i1.3179.
[4] Z. Basim dan Painem, “Implementasi Kriptografi Algoritma Rc4 Dan 3Des Dan Steganografi Dengan Algoritma Eof Untuk Keamanan Data Berbasis Desktop Pada Smk As-Su’Udiyyah,” Skanika, vol. 3, no. 4, hal. 54–60, 2020.
[5] A. T. A. P. Rukmana, Y. A., Rahman, R., Afriyadi, H., Moeis, D., Setiawan, Z., Subchan, N., Magdalena, L., Singadji, M., Rayeb, E. A., & Kusuma, No TitlePengantar Sistem Informasi: Panduan Praktis Pengenalan Sistem Informasi & Penerapannya. PT. Sonpedia Publishing Indonesia, 2023.
[6] N. Wijaya, E., Indriyati, R., Rinawati, R., Utami, R. N., Negsih, A. T., Suharyanto, S., Hermawan, E., Deseria, R., & Aziza, Pengantar Statistika: Konsep Dasar untuk Analisis Data. PT. Sonpedia Publishing Indonesia, 2024.
[7] M. K. Dedy Rahman Prehanto, S.Kom., Buku Ajar Konsep Sistem Informasi. SCOPINDO MEDIA PUSTAKA, 2020.
[8] A. Z. F. Rangkuti dan H. Fahmi, “Implementasi Kriptografi Untuk Keamanan File Text Dengan Menggunakan Metode MD5,” J. Nas. Komputasi dan Teknol. Inf., vol. 3, no. 2, hal. 170–175, 2020, doi: 10.32672/jnkti.v3i2.2384.
[9] M. Hidayat, M. Tahir, A. Sukriyadi, A. Sulton, C. A. S. A, dan S. A. F, “Penerapan kriptografi,” vol. 2, no. 3, hal. 35–41, 2023.
[10] S. P. Lestari, H. N. Fadlan, R. Angelia Purba, dan I. Gunawan, “Realisasi Kriptografi Pada Fitur Enkripsi End-To-End Pesan Whatsapp,” J. Media Inform., vol. 4, no. 1, hal. 1–8, 2022, doi: 10.55338/jumin.v4i1.423.
[11] T. H. Saputro, N. H. Hidayati, dan E. I. H. Ujianto, “Survei Tentang Algoritma Kriptografi Asimetris,” J. Inform. Polinema, vol. 6, no. 2, hal. 67–72, 2020, doi: 10.33795/jip.v6i2.345.
[12] G. A. J. Rahman, R., Ariantini, M. S., Hadi, A., Hayati, N., Gunawan, P. W., Mandowen, S. A., Widiyasono, N., & Saskara, Buku Ajar Keamanan Jaringan Komputer. PT. Sonpedia Publishing Indonesia., 2024.
[13] G. A. J. Rahman, R., Ariantini, M. S., Hadi, A., Hayati, N., Gunawan, P. W., Mandowen, S. A., Widiyasono, N., & Saskara, Buku Ajar Keamanan Jaringan Komputer. PT. Sonpedia Publishing Indonesia, 2024.
[14] M. Adik Putra, D. I. Mulyana, R. A. Amalia, dan M. Mirsandi, “Perancangan Aplikasi Enkripsi & Deskripsi pada Dokumen Dengan Algoritma Triple DES Berbasis Web,” J. Pendidik. Sains dan Komput., vol. 2, no. 01, hal. 57–69, 2022, doi: 10.47709/jpsk.v2i01.1354.
[15] K. Martin, Everyday Cryptography Fundamental Principles and Applications. OUP Oxford, 2017.
[16] M. Stamp, Information Security Principles and Practice. Wiley, 2021.
[17] I. Zufria, A. H. Hasugian, dan S. Oktawijaya, “Sistem Keamanan Folder Dengan Menggunakan Algoritma Rivest Code 4,” J. Multimed. dan Teknol. Inf., vol. 5, no. 2, hal. 45–52, 2023.
[18] G. Susilo, W., & Yang, Information Security and Privacy 23rd Australasian Conference. Springer International Publishing, 2018.
[19] B. A. Iswara, J. Tarigan, S. Man, dan A. Candra, “Comparison AES and RC4 Algorithm for Secure Data Passed Through an URL,” J. SAINTIKOM (Jurnal Sains Manaj. Inform. dan Komputer), vol. 22, no. 2, hal. 357, 2023, doi: 10.53513/jis.v22i2.8400.
Copyright (c) 2025 Simon Ricardo Valentino Hutauruk, Mufida Khairani

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright and grant the EXPLORER right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share (copy and redistribute the material in any medium or format) and adapt (remix, transform, and build upon the material) the work for any purpose, even commercially with an acknowledgement of the work's authorship and initial publication in EXPLORER.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in EXPLORER.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).





.png)















