DC Field | Value | Language |
dc.contributor.author | edy, victor haryanto | - |
dc.date.accessioned | 2020-10-02T06:49:55Z | - |
dc.date.available | 2020-10-02T06:49:55Z | - |
dc.date.issued | 2020-07-04 | - |
dc.identifier.issn | 2278-3091 | - |
dc.identifier.uri | http://repository.potensi-utama.ac.id/jspui/jspui/handle/123456789/3906 | - |
dc.description | Utilization of computer applications in a company or
organization today is a necessity. Almost in all fields of work
using tools in the form of computer applications [1].
Computer system security is becoming increasingly important
as the development of computerized business processes.
Computerized business process is a business process that most
of its activities use computer technology and make the
computer as a medium for storing important data so that it can
be said that computer media is an important factor in the
business processes that are carried out. Computer system
security is the focus not only of the computer device, but also
the security of the network, software or application programs
and database security [2].
Security and confidentiality of data stored in a database is one
important aspect of an information system, such as the data is
safe from information leakage [3]. Security of computer
networks connected to databases no longer guarantees data
security because data leaks can be caused by insiders or
parties directly related to databases such as database
administrators [4].
Database security can be done in various ways, starting from
limiting user access rights to the database itself, using field
names that are only understood by the administrator so that not all employees who are given permission to access the
database understand the existing database flow to avoid data
theft, data destruction and others et cetera, until the
implementation of cryptographic algorithms by the
administrator of the records in the database with the aim of
making the stored records more confidential and difficult to
read by others [5].
Sometimes the database is also stored in the Cloud Server, the
information owner saves the information on a trusted server.
Most people believe that the cloud is a dangerous place and
once you save your information to the cloud, you lose
complete control over it. The information owner cannot trust
the cloud server to control secure access to information. In
this way, the problem of safe access to information has turned
into the most basic testing problem in storage distributed by
the general public. So any ordinary security advances cannot
be linked directly to him [6].
One mechanism to improve data security in databases is to use
encryption technology [7]. The data stored in the database is
modified so that it is not easy to read. So encryption is a
process carried out to secure a data (called plaintext) into
hidden data (called ciphertext). Ciphertext is data that cannot
be read easily [8].
One method that can be used for database security is the
Elgamal Algorithm. The Elgamal algorithm invented by
Egyptian scientists [9], namely Taher Elgamal in 1985, is a
public-key cryptographic algorithm. Elgamal algorithm
process consists of three processes, namely the process of key
formation, the encryption process, and the decryption process.
Elgamal cryptography was initially used for digital signature
requirements, but was later modified so that it could be used
for security such as encryption and description [10]. Elgamal
cryptography is used in security software developed by GNU,
the PGP program, and in other security systems [11].
ElGamal security is based on a discrete logarithmic problem
to encrypt and decrypt messages separately. An intruder who
attempts to decrypt a disconnected message can try to recover
the private key. For this purpose logarithms need to be
calculated. There is no actual method for this, given the
specific needs of the initial group are met [12].
The research aims to optimize the security of database
processing that is used in the database security application of
lecturers using the Elgamal algorithm at the Potential Main
University | en_US |
dc.description.abstract | Each Higher Education Institution must have many
databases, one of which is a database of lecturers who store
the confidentiality of data and information from lecturers as
instructors. Securing lecturer databases is needed to protect
lecturer data and information from database theft. Creating
an optimal system in securing lecturer databases to avoid
individuals who have no right to access and process data and
information. The lecturer database processed in this study
uses the ElGamal algorithm with key formation using primes
and solving the problem requires discrete logarithmic
calculations. The keys used in this algorithm are public keys
and private keys. The results of testing this method is the
encrypted lecturer database. ElGamal's algorithm is very
helpful in securing the lecturer database at the Universitas
Potensi Utama. | en_US |
dc.publisher | International Journal of Advanced Trends in Computer Science and Engineering | en_US |
dc.relation.ispartofseries | ;4671-4677 | - |
dc.subject | database, encryption, algorithm | en_US |
dc.subject | elgamal, decryption, cryptography | en_US |
dc.title | Optimizing the Confidentiality of Lecturer Database using Elgamal Algorithm | en_US |
dc.type | Article | en_US |
Appears in Collections: |
|