{"title":"Teknik Keamanan Data Menggunakan Vigenere密码丹电子密码本(ECB)","authors":"Adi Widarma, Helmi Fauzi Siregar, M. D. Irawan","doi":"10.30645/J-SAKTI.V3I2.157","DOIUrl":null,"url":null,"abstract":"Data is important information both personal, group and company. Because of the importance of the data, many parties have kept the data very confidential so that it is not publicly recognized. But it cannot be denied that data can be stolen by unauthorized people. Request the data to be unsafe. A technique is needed to move data, namely by using cryptography. One of the existing cryptography techniques is classical cryptography such as vigenere cipher. However, this classic has a low level of security so it needs to be upgraded again. Then a combination of cryptography algorithms using modern cryptography, Electronic Code Book (ECB) is carried out. Using a combination of these two algorithms will improve data security.","PeriodicalId":402811,"journal":{"name":"J-SAKTI (Jurnal Sains Komputer dan Informatika)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Teknik Keamanan Data Menggunakan Vigenere Cipher Dan Electronic Code Book (ECB)\",\"authors\":\"Adi Widarma, Helmi Fauzi Siregar, M. D. Irawan\",\"doi\":\"10.30645/J-SAKTI.V3I2.157\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data is important information both personal, group and company. Because of the importance of the data, many parties have kept the data very confidential so that it is not publicly recognized. But it cannot be denied that data can be stolen by unauthorized people. Request the data to be unsafe. A technique is needed to move data, namely by using cryptography. One of the existing cryptography techniques is classical cryptography such as vigenere cipher. However, this classic has a low level of security so it needs to be upgraded again. Then a combination of cryptography algorithms using modern cryptography, Electronic Code Book (ECB) is carried out. Using a combination of these two algorithms will improve data security.\",\"PeriodicalId\":402811,\"journal\":{\"name\":\"J-SAKTI (Jurnal Sains Komputer dan Informatika)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"J-SAKTI (Jurnal Sains Komputer dan Informatika)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30645/J-SAKTI.V3I2.157\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"J-SAKTI (Jurnal Sains Komputer dan Informatika)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30645/J-SAKTI.V3I2.157","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Teknik Keamanan Data Menggunakan Vigenere Cipher Dan Electronic Code Book (ECB)
Data is important information both personal, group and company. Because of the importance of the data, many parties have kept the data very confidential so that it is not publicly recognized. But it cannot be denied that data can be stolen by unauthorized people. Request the data to be unsafe. A technique is needed to move data, namely by using cryptography. One of the existing cryptography techniques is classical cryptography such as vigenere cipher. However, this classic has a low level of security so it needs to be upgraded again. Then a combination of cryptography algorithms using modern cryptography, Electronic Code Book (ECB) is carried out. Using a combination of these two algorithms will improve data security.