PENGAMANAN SISTEM INFORMASI PENGGUNA PADA APLIKASI GRANT ME MENGGUNAKAN ANDVANCED ENCRYPTION STANDARD
SECURING USER INFORMATION SYSTEMS IN GRANT ME APPLICATIONS USING ANDVANCED ENCRYPTION STANDARD
Abstract
Education has an important role in ensuring the survival of the nation and state, as well as improving the quality of human resources to participate in national development. Today's developing technology, including in the field of education, can make it easier for students to learn new things and get information, including about scholarship programs. However, the security of scholarship recipient data needs to be considered so that it is not easily accessed by unauthorized people. Cryptography can be an appropriate approach to secure such data. This research aims to secure Grant Me application user information using the AES algorithm to encrypt the username and password of scholarship recipients and scholarship providers. The method used is experimental testing of the system to be built using the AES algorithm. The results showed that the application of the AES algorithm with a key value of 256 bytes proved that user login information was not easy to know from either the application owner or a third party. With the application of AES as a security system, it can be concluded that the application becomes more secure from hacker interference.
References
“Tren Penelitian Keterampilan Berpikir Kritis Pada Jurnal Pendidikan Dasar Di Indonesia | Juliyantika | Jurnal Basicedu.” Https://Jbasic.Org/Index.Php/Basicedu/Article/View/2869/Pdf (Accessed Jul. 05, 2023).
A. Purwanto And H. W. Nugroho, “Analisa Perbandingan Kinerja Algoritma C4.5 Dan Algoritma K-Nearest Neighbors Untuk Klasifikasi Penerima Beasiswa,” Jurnal Teknoinfo, Vol. 17, No. 1, Art. No. 1, Jan. 2023, Doi: 10.33365/Jti.V17i1.2370.
W. Susanto And A. Mulyani, “Analisa Algoritma C4.5 Terhadap Penentuan Rekomendasi Penerima Beasiswa,” Oktal : Jurnal Ilmu Komputer Dan Sains, Vol. 1, No. 10, Art. No. 10, Oct. 2022.
R. Wahyuni And Y. Irawan, “Aplikasi E-Book Untuk Aturan Kerja Berbasis Web Di Pengadilan Negeri Muara Bulian Kelas Ii Jambi,” Jurnal Ilmu Komputer, Vol. 9, No. 1, Pp. 20–26, May 2020, Doi: 10.33060/Jik/2020/Vol9.Iss1.152.
I. Riadi, A. Ifani, And R. Kusuma, “Optimization And Evaluation Of Authentication System Using Blockchain Technology,” Emerging Science Journal, Vol. 4, Pp. 225–240, Feb. 2022, Doi: 10.28991/Esj-2021-Sp1-015.
I. Riadi, H. Herman, And A. Z. Ifani, “Optimization Of System Authentication Services Using Blockchain Technology,” Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, And Control, Nov. 2021, Doi: 10.22219/Kinetik.V6i4.1325.
Aprizaldi * 1 , Mhd Arief Hasan2 , Debi Setiawan3, “Aplikasi Keamanan Data Berbasis Web Menggunakan Algoritma Aes 128 Untuk Enkripsi Dan Dekripsi Data,” Jurnal Teknik Informatika.
A. Ramadan And P. Painem, “Pengamanan Data Keuangan Menggunakan Algoritma Advanced Encryption Standard 128 Pada Pt. Charise Deo Indonesia,” Prosiding Seminar Nasional Mahasiswa Fakultas Teknologi Informasi (Senafti), Vol. 1, No. 1, Art. No. 1, Sep. 2022.
A. Ignasius And D. V. S. Y. Sakti, “Penerapan Algoritma Aes (Advance Encryption Standart) 128 Untuk Enkripsi Dokumen Di Pt. Gunung Geulis Elok Abadi,” Skanika: Sistem Komputer Dan Teknik Informatika, Vol. 5, No. 1, Art. No. 1, Jan. 2022, Doi: 10.36080/Skanika.V5i1.2118.
Tiwi Juliyantika, Hamdan Husein Batubara, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard”.
R. Marpaung, “Implementasi Pada Sistem Informasi Penyimpanan Data Pribadi Dengan Metode Enkripsi Aes,” Vol. 2, No. 11, Art. No. 11, 2022, Accessed: Jul. 05, 2023. [Online]. Available: Http://Uti.Teknokrat.Ac.Id/Index.Php/Cyberarea/Article/View/274
D. J. S. H. N. A. Bambang Ismanto, "Pengembangan Prototype Aplikasi Notifikasi Jadwal Ujian Berbasis Android," Jurnal Teknologi dan Sistem Informasi Univrab, vol. VII, no. 2, pp. 147-155, 2022.
H. A. Z. I. Imam Riadi, "Pengembangan Layanan Autentikasi Berbasis Teknologi Blockchain," Journal of Applied Informatics and Computing, vol. V, no. 1, pp. 1-8, 2021.
H. A. Z. I. Imam Riadi, "Optimization of system authentication services using blockchain technology," Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, vol. VI, no. 4, pp. 277-286, 2021.
A. S. Muhammad Fahrizal, "Pengamanan M-Commerce Menggunakan One Time Password Metode Pseudo Random Number Generator (PRNG)," Jurnal Teknologi dan Sistem Informasi Univrab, vol. V, no. 2, pp. 108-116, 2020.
E. H. H. H. R. Enggar Novianto, "Keamanan Informasi (Information Security) Pada Aplikasi Sistem Informasi Manajemen Sumber Daya Manusia," Jurnal Teknologi dan Sistem Informasi Univrab, vol. VIII, no. 1, pp. 10-15, 2023.
Copyright (c) 2024 Rabit : Jurnal Teknologi dan Sistem Informasi Univrab
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright Notice
The copyright of the received article shall be assigned to the publisher of the journal. The intended copyright includes the right to publish the article in various forms (including reprints). The journal maintains the publishing rights to published articles. Therefore, the author must submit a statement of the Copyright Transfer Agreement.*)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
In line with the license, authors and any users (readers and other researchers) are allowed to share and adapt the material only for non-commercial purposes. In addition, the material must be given appropriate credit, provided with a link to the license, and indicated if changes were made. If authors remix, transform or build upon the material, authors must distribute their contributions under the same license as the original.
Please find the rights and licenses in RABIT : Jurnal Teknologi dan Sistem Informasi Univrab. By submitting the article/manuscript of the article, the author(s) accept this policy.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author’s Warranties
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).
3. User Rights
RABIT's spirit is to disseminate articles published are as free as possible. Under the Creative Commons license, RABIT permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and RABIT on distributing works in the journal.
4. Rights of Authors
Authors retain all their rights to the published works, such as (but not limited to) the following rights;
- Copyright and other proprietary rights relating to the article, such as patent rights,
- The right to use the substance of the article in own future works, including lectures and books,
- The right to reproduce the article for own purposes,
- The right to self-archive the article,
- The right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (RABIT : Jurnal Teknologi dan Sistem Informasi Univrab).
5. Co-Authorship
If the article was jointly prepared by other authors, any authors submitting the manuscript warrants that he/she has been authorized by all co-authors to be agreed on this copyright and license notice (agreement) on their behalf, and agrees to inform his/her co-authors of the terms of this policy. RABIT will not be held liable for anything that may arise due to the author(s) internal dispute. RABIT will only communicate with the corresponding author.
6. Royalties
This agreement entitles the author to no royalties or other fees. To such extent as legally permissible, the author waives his or her right to collect royalties relative to the article in respect of any use of the article by RABIT.
7. Miscellaneous
RABIT will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed. RABIT's editors may modify the article to a style of punctuation, spelling, capitalization, referencing and usage that deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers as mentioned in point 3.