Implementation Of Vigenere Cryptography Algorithm In Lhokseumawe State Polytechnic Storage System

Dede Kurniawan, Indrawati Indrawati, Hari Toha Hidayat

Sari


Cloud Storage is a technology used to store data online. However, this technology also raises issues in terms of security. Therefore, the author wants to create a cloud storage system using cryptographic security to secure data. With cryptographic techniques that regulate cloud storage, users are without worry about borrowing or borrowing data. The cryptographic method applied is the vigenere cipher algorithm which is a type of classical cryptography. Cloud Storage is implemented on public and private networks to conduct data encryption testing. Based on tests conducted, implementation on private networks is better with an average time of 3.84 seconds for encryption and 253.6 milliseconds for decryption. While on public networks with an average time of 45.3 seconds for encryption and 392 milliseconds for decryption. To measure the effectiveness of cryptography, it is done by avalanche affect method
which produces a value of 1.4% to 7% with an average of 3.92%.


Kata Kunci


Cloud Storage; Vigenere Cipher; Private; public; avalanche affect.

Teks Lengkap:

PDF

Referensi


S. A. Indrawata Wardhana, "Designing and implementing Cloud Storage architecture at Iain STS Jambi," Manaj. Sist. Inf., vol. 2, No. 1, pp. 244 – 259, 2017.

R. H. Dedi Kurniawan, Rita Afyenni, "the implementation of the AES algorithm in encrypting files integrated with the Android-based Cloud Storage service," ISSN Media Electron., vol. 3, No. September, pp. 4 – 5, 2018.

S. Mahfud, "Building a Search Engine-based Repository system using the algorithm of Knuth Morris Pratt," vol. 1, No. 1, 2018.

T. W. P. Bernard Raditio Parulian, Surya Michrandi Nasution, "Secure Cloud design and implementation using Diffie-Hellman Key Exchange and Triple Des Algorithm (3Des) Design and Implementation Secure Cloud By Using Diffie-Hellman Key Exchange and Triple Des Algorithm (3Des), "vol. 2, No. 2, pp. 3808 – 3815, 2015.

Andriani, "APPLICATION of VIGENERE CIPHER IN DATA

SECURITY ALGORITHM IN INFORMATION SYSTEMS," Teknol.

Engineering INF. and Komput., vol. 1, No. 17, pp. 1 – 4, 2018.

T. W. P. Eka Cahya Pratama, Surya Michrandi Nasution, "THE

PLANNING AND IMPLEMENTATION of SECURE CLOUD USING

DIFFIE-HELLMAN KEY EXCHANGE AND SERPENT CRYPTOGRAPHY ALGORITHM," vol. 2, No. 2, pp. 3808 – 3815, 2015.

A. H. B. Ahmad Leo Yudanto, Herman Tolle, "Design of information System application of biomedical laboratory management," J. Begb. Hairdress. Inf. and science of Komput., vol. 1, No. 8, pp. 628 – 634, 2017.

A. Hanani, "Designing Online Academic Information System University 66 Islam Negeri Malang," p. 140, 2008.

A. H. Muhbib, "Dekstop implementation of the inventory system at Hudi Motor Karangrayung Grobogan," EPrints Udinus, pp. 1 – 41, 2016.

YUSDIARDI, "DESIGNING the SALES INFORMATION SYSTEM

(CASE STUDY: PT. I-CUBE CREATIVINDO) thesis," 2014.

D. Kuswanto, S. A. A. Tendean, and Mulaab, "the implementation of a Whitespace steganography algorithm and RC6 encryption for the security of the text," Semin. Nas. Hairdress. and Engineering, pp. 1 – 8, 2


Refbacks

  • Saat ini tidak ada refbacks.


##submission.copyrightStatement##

##submission.license.cc.by-sa4.footer##

Creative Commons License

Prosiding Seminar Nasional Politeknik Negeri Lhokseumawe is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License

© 2017 All rights reserved |Seminar nasional Politeknik Negeri Lhokseumawe p-ISSN:2598-3954.

.