Implementation of Security with Login Data using the Electronic Code Book Algorithm

##plugins.themes.academic_pro.article.main##

Nera Mayana Br Tarigan
Muhammad Iqbal Panjaitan

Abstract

Currently, the security of stored data has become an absolute requirement. Security against computer networks connected to the database is no longer safe because data leaks can be caused by irresponsible people. The results of this program can be used to secure data. One of the cryptography that is suitable for securing the data is the Electronic Code Book algorithm because the Electronic Code Book cryptography is suitable for encrypting a password in a login data. The program results show that the Electronic Code Book (ECB) algorithm is suitable for this security, because it can encrypt the password in the login data.

##plugins.themes.academic_pro.article.details##

How to Cite
Br Tarigan, N. M., & Panjaitan, M. I. (2018). Implementation of Security with Login Data using the Electronic Code Book Algorithm. Login : Jurnal Teknologi Komputer, 12(2), 36-39. https://doi.org/10.24224/login.v12i2.25

References

[1] F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Inform. Mulawarman J. Ilm. Ilmu Komput., 2016, doi: 10.30872/jim.v10i1.23.
[2] C. Program, S. Magister, K. Kunci, : Kriptografi, and K. Publik, “KEAMANAN DATA DENGAN METODE KRIPTOGRAFI KUNCI PUBLIK,” J. TIMES, 2016.
[3] Jumrin, Sutardi, and Subardin, “Aplikasi sistem keamanan basis data dengan teknik kriptografi rc4,” semanTIK, 2016, doi: 10.1111/cdev.12009.Mine.
[4] M. K. Harahap, “ANALISIS PERBANDINGAN ALGORITMA KRIPTOGRAFI KLASIK VIGENERE CIPHER DAN ONE TIME PAD,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), 2016, doi: 10.30743/infotekjar.v1i1.43.
[5] R. Arifin and L. T. Oktoviana, “Implementasi Kriptografi Dan Steganografi Menggunakan Algoritma RSA Dan Metode LSB,” J. Din. Inform., 2013.
[6] E. Setyaningsih, “Kriptografi dan Implementasinya Menggunakan Matlab,” Andi, 2015.
[7] D. Rizal, T. Sutojo, and Y. Rahayu, “Implementasi Kriptografi Gambar Menggunakan Kombinasi Algoritma Elgamal Dan Mode Operasi Ecb (Electronic Code Book),” Techno.COM, 2016.
[8] E. Yoga and I. Kurniawan, “PENERAPAN TEORI CHAOS PADA KRIPTOGRAFI MENGGUNAKAN ALGORITMA STREAM CIPHER DAN ELECTRONIC CODE BOOK (ECB) UNTUK KEAMANAN PESAN TEKS,” Eprints UDINUS, 2015.