Dimas Krisna Maulana, Sunilfa Maharani Tanjung, Reni Septiani Ritonga, A. Ikhwan
{"title":"Penerapan Kriptografi Vigenere Cipher Pada Kekuatan Kata Sandi","authors":"Dimas Krisna Maulana, Sunilfa Maharani Tanjung, Reni Septiani Ritonga, A. Ikhwan","doi":"10.47233/jsit.v3i1.483","DOIUrl":null,"url":null,"abstract":"One of the methods of securing information systems that is commonly known by many people is passwords. Without realizing it, passwords have an important role in securing information that is confidential. In some applications related to software, such as cellphones, ATM cards, and others. There is also a security system that functions similarly to a password. commonly known as a PIN Code. Although it only consists of numbers, its use is the same as a password, which is to secure information. The stored information is usually digital or database-based. Password security aims to secure a password stored in the database, the password needs to be secured because if the password is known by unauthorized parties or who are not entitled then important and other data will be stolen. The password that is secured is a password that is used daily, be it email passwords, social media, databases, operating systems on the device and others into the database. vigenere cipher algorithm to encode the password in a database. The result of this test is that password security is carried out based on the vigenere cipher method using a visual studio application and utilizing a Database with a MySQL application.  The end result used is the result of the security process with the result key having no resemblance to the original record. Formation of keys based on user decisions. It is worth paying attention that the key should not be forgotten.","PeriodicalId":302680,"journal":{"name":"Jurnal Sains dan Teknologi (JSIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Sains dan Teknologi (JSIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47233/jsit.v3i1.483","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

许多人都知道的保护信息系统的方法之一是密码。在没有意识到的情况下,密码在保护机密信息方面发挥着重要作用。在一些与软件相关的应用中,如手机、ATM卡等。还有一个与密码功能类似的安全系统。通常称为PIN码。虽然它只由数字组成,但它的用途与密码相同,即保护信息。存储的信息通常是数字化的或基于数据库的。密码安全旨在保护存储在数据库中的密码,密码需要得到保护,因为如果密码被未经授权的方或无权的人知道,那么重要和其他数据将被窃取。受保护的密码是日常使用的密码,无论是电子邮件密码、社交媒体密码、数据库密码、设备上的操作系统密码还是数据库中的其他密码。Vigenere密码算法在数据库中对密码进行编码。该测试的结果是,使用visual studio应用程序和MySQL应用程序利用数据库,基于vigenere密码方法实现密码安全。使用的最终结果是安全过程的结果,结果密钥与原始记录没有相似之处。基于用户决策的键的形成。值得注意的是,不要忘记钥匙。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Penerapan Kriptografi Vigenere Cipher Pada Kekuatan Kata Sandi
One of the methods of securing information systems that is commonly known by many people is passwords. Without realizing it, passwords have an important role in securing information that is confidential. In some applications related to software, such as cellphones, ATM cards, and others. There is also a security system that functions similarly to a password. commonly known as a PIN Code. Although it only consists of numbers, its use is the same as a password, which is to secure information. The stored information is usually digital or database-based. Password security aims to secure a password stored in the database, the password needs to be secured because if the password is known by unauthorized parties or who are not entitled then important and other data will be stolen. The password that is secured is a password that is used daily, be it email passwords, social media, databases, operating systems on the device and others into the database. vigenere cipher algorithm to encode the password in a database. The result of this test is that password security is carried out based on the vigenere cipher method using a visual studio application and utilizing a Database with a MySQL application.  The end result used is the result of the security process with the result key having no resemblance to the original record. Formation of keys based on user decisions. It is worth paying attention that the key should not be forgotten.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信