Implementation Of The Rivest Cipher 4 Method Web-Based Employee Data
DOI:
https://doi.org/10.56910/ictmt.v1i1.67Keywords:
Rivest Chiper 4, kriptografi, Avalanche Effect, Brute ForceAbstract
Data security has always been an exciting topic to discuss in the era of globalization and industrial revolution 5.0. Along with the development of Cryptographic techniques, which continue to develop. Security of data storage techniques is essential in a data security system. The method used in this research is the Rivest Chiper 4 Algorithm. This research takes a case study of employee data storage security in a company that uses local storage as a medium for storing employee data. A web-based employee data collection system with the Rivest Chiper 4 algorithm implemented on the server side. The research results show that in testing the Avalanche Effect Rivest Chiper 4 algorithm with three key character length variations, an average value of 50.87% was obtained. The test results show that the average Avalanche Effect value is more than 50%, indicating that small changes to the plaintext can impact the ciphertext. With the help of Cryptool 1, using Brute Force time testing results with variations in key length, the password cracking time was 33 years with a 6-character key length. The longer the key is used, the longer the completion process will take to crack the ciphertext. Meanwhile, plaintext length is linearly correlated with the length of Brute Force testing time but is insignificant. Hardware performance also affects the estimated time of Brute Force.
References
Nugroho, N. B. Z. Azmi, and S. N. J. J. S. Arif. (2016). Aplikasi Keamanan Email Menggunakan Algoritma Rc4.
Munir, R. J. I. (2006). Diktat Kuliah IF5054 Kriptografi. ProgramStudi Teknik Informatika, Sekolah Teknik Elektro dan Informatika. Bandung.
Andrico, A. and M. J. S. Syafrullah. (2018). Aplikasi Enkripsi Database Menggunakan Algortima RC4 Berbasis Desktop, vol. 1, no. 3, pp. 1011- 1017.
Ammary, G. and S. J. S. Mulyati. (2018). Aplikasi Kriptografi Untuk Keamanan Databse Dengan Metode RC4 Dan Elgamal Berbasis Web Pada Jxl DesignCo, vol. 1, no. 2, pp. 815-820, 2018.
Stiawan, D. (2005). Sistem Keamanan Komputer. Elex Media Komputindo. Jakarta.
Munir, R. J. I. (2006). Kriptografi. Bandung.
Irfianti, A. D. (2007). Metode pengamanan enskripsi RC4 streamcipher untuk aplikasi pelayanan gangguan. Seminar Nasional Aplikasi Teknologi Informasi (SNATI).
Jindal,P. and B. Singh. 2014. Performance analysis of modified RC4 encryption algorithm. International conference on recent advances and innovations in engineering (ICRAIE-2014): IEEE, pp. 1-5.
Putra, Y. P., F. Nuraeni, and A. M. J. I. J. Sahrin. 2021. Implementasi Steganografi dan Algorithma RC4 untuk meningkatkan keamanan data penjualan voucher game elektronik (Studi Kasus: Berewek Cell), vol. 9, no. 2, pp. 186-200.
Sriadhi, S., R. Rahim, and A. S. Ahmar. 2018. RC4 Algorithm visualization for cryptography education. Journal of Physics: Conference Series, vol. 1028, no. 1: IOP Publishing, p. 012057.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 INTERNATIONAL CONFERENCE ON DIGITAL ADVANCE TOURISM, MANAGEMENT AND TECHNOLOGY
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.