Kerahasiaan Teks Basis Data MySQL Menggunakan Algoritma Elgamal
DOI:
https://doi.org/10.37034/jsisfotek.v1i4.11Keywords:
Confidentiality, Cryptography, Elgamal algorithm, Database, MySQLAbstract
The common method used to secure a MySQL database is in access control. The technique is the use of a password. To better secure the data sent cryptographic techniques need to be done. This study uses the Elgamal method in conducting cryptography. The results of this study generate MySQL databases in random form during safer delivery and can only be accessed by parties who have a password. So this research can further improve MySQL data security.
References
Warman, Sultan (2018). Perancangan Sistem Simulasi Data Terintegrasi (Studi Kasus : Data SIM, KTP dan KTM). TEKNOIF, 6(3), 100-109. https://doi.org/10.21063/JTIF.2018.V6.2
Enterprise (2018). HTML, PHP dan MySQL Untuk Pemula. 1st ed. Bandung: PT. Elex Media Komputindo.
Asaad, & Segerey (2017). School Management Application Using iOS. Academic Journal of Nawroz University, 7(4), 38-44. https://doi.org/10.25007/ajnu.v7n4a269
Al-Zubi, M., & Abu-Shareha, A. A. (2019). Efficient signcryption scheme based on El-Gamal and Schnorr. Multimedia Tools and Applications, 78(9), 11091–11104. https://doi.org/10.1007/s11042-018-6636-7
Dwork (2018). The Future Of The Journal Of Privacy And Confidentiality. Journal of Privacy and Confidentiality, 8(1), 1-2. https://doi.org/10.29012/jpc.708
Ordonez, A. J., Gerardo, B. D., & Medina, R. P. (2018). Digital signature with multiple signatories based on modified ElGamal Cryptosystem. 5th International Conference on Business and Industrial Research (ICBIR), Bangkok, 89-94. https://doi.org/10.1109/ICBIR.2018.8391172
Kalsi, S., Kaur, H., & Chang (2018). DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation. Journal of Medical Systems, 42(17). https://doi.org/10.1007/s10916-017-0851-z
Gupta, D. S., & Biswas, G. P. (2017). Design of lattice‐based ElGamal encryption and signature schemes using SIS problem. Wiley Online Library, https://doi.org/10.1002/ett.3255
Hardi, S. M., Tarigan, J. T., & Safrina, N. (2017). Hybrid Cryptosystem For Image File Using Elgamal And Double Playfair Cipher Algorithm. Journal of Physics: Conference Series, 978(1), 012068. https://doi.org/10.1088/1742-6596/978/1/012068
Soni, P., Ali, R., & Pal, A.K. (2017). A Two-factor based Remote User Authentication Scheme using ElGamal Cryptosystem. Proceedings of the ACM Workshop on Internet of Things (IoT) Security: Issues and Innovations, Article No. 3. https://doi.org/10.1145/3084030.3084031
Mawengkang, H., Siregar, A. F., & Efendi, S. (2018). Combination Analysis Of Elgamal Algorithm and LUC Algorithm In File Security. IOP Conference Series: Materials Science and Engineering, Volume 420, conference 1, https://doi.org/10.1088/1757-899x/420/1/012130
Jannati, H., & Bahrak, B. (2017). An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy. Wireless Personal Communications, 97(2), 3113–3123 https://doi.org/10.1007/s11277-017-4664-7
D. Rachmawati, A. S., Harahap, & Purba, R. N. (2018). A Hybird Cryptosystem Approach For Data Security By Using Triple DES Algorithm And Elgamal Algorithm. IOP Conference Series: Materials Science and Engineering, 453, 012018. https://doi.org/10.1088/1757-899x/453/1/012018