• Login
    View Item 
    •   USU-IR Home
    • Faculty of Computer Science and Information Technology
    • Department of Computer Science
    • Undergraduate Theses
    • View Item
    •   USU-IR Home
    • Faculty of Computer Science and Information Technology
    • Department of Computer Science
    • Undergraduate Theses
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Pengamanan Database Field-Level Encryption Menggunakan Hybrid Cryptosystem Algoritma Hill Cipher dan Algoritma Rabin P

    Securing the Database with Field-Level Encryption Using Hybrid Cryptosystem Hill Cipher Algorithm and Rabin P Algorithm

    Thumbnail
    View/Open
    Cover (797.3Kb)
    Fulltext (2.551Mb)
    Date
    2024
    Author
    Gulo, Sastra Harapan
    Advisor(s)
    Rachmawati, Dian
    Lydia, Maya Silvi
    Metadata
    Show full item record
    Abstract
    Data security in databases is crucial to prevent unauthorized parties from viewing, accessing, and manipulating the data. Cryptography algorithms are required to secure the data in the database to make it incomprehensible. The Hill Cipher algorithm is a symmetric algorithm that is advantageous due to its speed in the encryption and decryption processes but is weak against known-plaintext attacks. Therefore, field-level encryption is necessary to ensure each row of data in the database has a different encryption key, which complicates key management. The Rabin P algorithm, an asymmetric algorithm, offers high security but generates ciphertext several times longer than the plaintext. A Hybrid Cryptosystem combines symmetric and asymmetric algorithms, leveraging their respective strengths. The Hill Cipher algorithm key for data encryption is generated using Blum-Blum-Shub. In the encryption process with the Hybrid Cryptosystem, the Hill Cipher algorithm, the Rabin P algorithm, and the Blum-Blum-Shub random number generator successfully secure the data in the database, making it incomprehensible and ensuring that the encryption keys are different for each row of data and encrypted. The decryption process can return the encrypted data to its original form without any data loss. The time required for encryption and decryption is directly proportional to the number of characters. Key renewal for the Rabin P algorithm is performed by decrypting the data (ciphertext) using the old key and then re-encrypting the data (plaintext) using the new key.
    URI
    https://repositori.usu.ac.id/handle/123456789/100854
    Collections
    • Undergraduate Theses [1181]

    Repositori Institusi Universitas Sumatera Utara (RI-USU)
    Universitas Sumatera Utara | Perpustakaan | Resource Guide | Katalog Perpustakaan
    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of USU-IRCommunities & CollectionsBy Issue DateTitlesAuthorsAdvisorsKeywordsTypesBy Submit DateThis CollectionBy Issue DateTitlesAuthorsAdvisorsKeywordsTypesBy Submit Date

    My Account

    LoginRegister

    Repositori Institusi Universitas Sumatera Utara (RI-USU)
    Universitas Sumatera Utara | Perpustakaan | Resource Guide | Katalog Perpustakaan
    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV