Please use this identifier to cite or link to this item: http://repository.potensi-utama.ac.id/jspui/jspui/handle/123456789/3905
Title: Optimizing the Confidentiality of Lecturer Database using Elgamal Algorithm
Authors: Edy, Victor
Keywords: database, encryption, algorithm
elgamal, decryption, cryptography
Issue Date: 4-Jul-2020
Publisher: International Journal of Advanced Trends in Computer Science and Engineering
Series/Report no.: ;4671-4677
Abstract: Each Higher Education Institution must have many databases, one of which is a database of lecturers who store the confidentiality of data and information from lecturers as instructors. Securing lecturer databases is needed to protect lecturer data and information from database theft. Creating an optimal system in securing lecturer databases to avoid individuals who have no right to access and process data and information. The lecturer database processed in this study uses the ElGamal algorithm with key formation using primes and solving the problem requires discrete logarithmic calculations. The keys used in this algorithm are public keys and private keys. The results of testing this method is the encrypted lecturer database. ElGamal's algorithm is very helpful in securing the lecturer database at the Universitas Potensi Utama
Description: Utilization of computer applications in a company or organization today is a necessity. Almost in all fields of work using tools in the form of computer applications [1]. Computer system security is becoming increasingly important as the development of computerized business processes. Computerized business process is a business process that most of its activities use computer technology and make the computer as a medium for storing important data so that it can be said that computer media is an important factor in the business processes that are carried out. Computer system security is the focus not only of the computer device, but also the security of the network, software or application programs and database security [2]. Security and confidentiality of data stored in a database is one important aspect of an information system, such as the data is safe from information leakage [3]. Security of computer networks connected to databases no longer guarantees data security because data leaks can be caused by insiders or parties directly related to databases such as database administrators [4]. Database security can be done in various ways, starting from limiting user access rights to the database itself, using field names that are only understood by the administrator so that not all employees who are given permission to access the database understand the existing database flow to avoid data theft, data destruction and others et cetera, until the implementation of cryptographic algorithms by the administrator of the records in the database with the aim of making the stored records more confidential and difficult to read by others [5]. Sometimes the database is also stored in the Cloud Server, the information owner saves the information on a trusted server. Most people believe that the cloud is a dangerous place and once you save your information to the cloud, you lose complete control over it. The information owner cannot trust the cloud server to control secure access to information. In this way, the problem of safe access to information has turned into the most basic testing problem in storage distributed by the general public. So any ordinary security advances cannot be linked directly to him [6]. One mechanism to improve data security in databases is to use encryption technology [7]. The data stored in the database is modified so that it is not easy to read. So encryption is a process carried out to secure a data (called plaintext) into hidden data (called ciphertext). Ciphertext is data that cannot be read easily [8]. One method that can be used for database security is the Elgamal Algorithm. The Elgamal algorithm invented by Egyptian scientists [9], namely Taher Elgamal in 1985, is a public-key cryptographic algorithm. Elgamal algorithm process consists of three processes, namely the process of key formation, the encryption process, and the decryption process. Elgamal cryptography was initially used for digital signature requirements, but was later modified so that it could be used for security such as encryption and description [10]. Elgamal cryptography is used in security software developed by GNU, the PGP program, and in other security systems [11]. ElGamal security is based on a discrete logarithmic problem to encrypt and decrypt messages separately. An intruder who attempts to decrypt a disconnected message can try to recover the private key. For this purpose logarithms need to be calculated. There is no actual method for this, given the specific needs of the initial group are met [12]. The research aims to optimize the security of database processing that is used in the database security application of lecturers using the Elgamal algorithm at the Potential Main University.
URI: http://repository.potensi-utama.ac.id/jspui/jspui/handle/123456789/3905
ISSN: 2278-3091
Appears in Collections:

Files in This Item:
File Description SizeFormat 
Optimizing the Confidentiality of Lecturer Database using Elgamal Algorithm.pdf519.88 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.