Implementation Of The Rivest Cipher 4 Method Web-Based Employee Data

Authors

  • Dwi Kuswanto Universitas Trunojoyo Madura, Bangkalan
  • Ach. Khozaimi Universitas Trunojoyo Madura, Bangkalan
  • Deden Nur Eka Abdi  Universitas Trunojoyo Madura, Bangkalan

DOI:

https://doi.org/10.56910/ictmt.v1i1.67

Keywords:

Rivest Chiper 4, kriptografi, Avalanche Effect, Brute Force

Abstract

Data security has always been an exciting topic to discuss in the era of globalization and industrial revolution 5.0. Along with the development of Cryptographic techniques, which continue to develop. Security of data storage techniques is essential in a data security system. The method used in this research is the Rivest Chiper 4 Algorithm. This research takes a case study of employee data storage security in a company that uses local storage as a medium for storing employee data. A web-based employee data collection system with the Rivest Chiper 4 algorithm implemented on the server side. The research results show that in testing the Avalanche Effect Rivest Chiper 4 algorithm with three key character length variations, an average value of 50.87% was obtained. The test results show that the average Avalanche Effect value is more than 50%, indicating that small changes to the plaintext can impact the ciphertext. With the help of Cryptool 1, using Brute Force time testing results with variations in key length, the password cracking time was 33 years with a 6-character key length. The longer the key is used, the longer the completion process will take to crack the ciphertext. Meanwhile, plaintext length is linearly correlated with the length of Brute Force testing time but is insignificant. Hardware performance also affects the estimated time of Brute Force.

Author Biography

Ach. Khozaimi, Universitas Trunojoyo Madura, Bangkalan

 

 

References

Nugroho, N. B. Z. Azmi, and S. N. J. J. S. Arif. (2016). Aplikasi Keamanan Email Menggunakan Algoritma Rc4.

Munir, R. J. I. (2006). Diktat Kuliah IF5054 Kriptografi. ProgramStudi Teknik Informatika, Sekolah Teknik Elektro dan Informatika. Bandung.

Andrico, A. and M. J. S. Syafrullah. (2018). Aplikasi Enkripsi Database Menggunakan Algortima RC4 Berbasis Desktop, vol. 1, no. 3, pp. 1011- 1017.

Ammary, G. and S. J. S. Mulyati. (2018). Aplikasi Kriptografi Untuk Keamanan Databse Dengan Metode RC4 Dan Elgamal Berbasis Web Pada Jxl DesignCo, vol. 1, no. 2, pp. 815-820, 2018.

Stiawan, D. (2005). Sistem Keamanan Komputer. Elex Media Komputindo. Jakarta.

Munir, R. J. I. (2006). Kriptografi. Bandung.

Irfianti, A. D. (2007). Metode pengamanan enskripsi RC4 streamcipher untuk aplikasi pelayanan gangguan. Seminar Nasional Aplikasi Teknologi Informasi (SNATI).

Jindal,P. and B. Singh. 2014. Performance analysis of modified RC4 encryption algorithm. International conference on recent advances and innovations in engineering (ICRAIE-2014): IEEE, pp. 1-5.

Putra, Y. P., F. Nuraeni, and A. M. J. I. J. Sahrin. 2021. Implementasi Steganografi dan Algorithma RC4 untuk meningkatkan keamanan data penjualan voucher game elektronik (Studi Kasus: Berewek Cell), vol. 9, no. 2, pp. 186-200.

Sriadhi, S., R. Rahim, and A. S. Ahmar. 2018. RC4 Algorithm visualization for cryptography education. Journal of Physics: Conference Series, vol. 1028, no. 1: IOP Publishing, p. 012057.

Downloads

Published

2023-12-31

How to Cite

Dwi Kuswanto, Ach. Khozaimi, & Deden Nur Eka Abdi . (2023). Implementation Of The Rivest Cipher 4 Method Web-Based Employee Data . International Conference On Digital Advanced Tourism Management And Technology, 1(1), 243–252. https://doi.org/10.56910/ictmt.v1i1.67

Issue

Section

Articles

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.