Kerahasiaan Teks Basis Data MySQL Menggunakan Algoritma Elgamal

Authors

  • admin admin

DOI:

https://doi.org/10.37034/jsisfotek.v1i4.11

Keywords:

Confidentiality, Cryptography, Elgamal algorithm, Database, MySQL

Abstract

The common method used to secure a MySQL database is in access control. The technique is the use of a password. To better secure the data sent cryptographic techniques need to be done. This study uses the Elgamal method in conducting cryptography. The results of this study generate MySQL databases in random form during safer delivery and can only be accessed by parties who have a password. So this research can further improve MySQL data security.

References

Warman, Sultan (2018). Perancangan Sistem Simulasi Data Terintegrasi (Studi Kasus : Data SIM, KTP dan KTM). TEKNOIF, 6(3), 100-109. https://doi.org/10.21063/JTIF.2018.V6.2

Enterprise (2018). HTML, PHP dan MySQL Untuk Pemula. 1st ed. Bandung: PT. Elex Media Komputindo.

Asaad, & Segerey (2017). School Management Application Using iOS. Academic Journal of Nawroz University, 7(4), 38-44. https://doi.org/10.25007/ajnu.v7n4a269

Al-Zubi, M., & Abu-Shareha, A. A. (2019). Efficient signcryption scheme based on El-Gamal and Schnorr. Multimedia Tools and Applications, 78(9), 11091–11104. https://doi.org/10.1007/s11042-018-6636-7

Dwork (2018). The Future Of The Journal Of Privacy And Confidentiality. Journal of Privacy and Confidentiality, 8(1), 1-2. https://doi.org/10.29012/jpc.708

Ordonez, A. J., Gerardo, B. D., & Medina, R. P. (2018). Digital signature with multiple signatories based on modified ElGamal Cryptosystem. 5th International Conference on Business and Industrial Research (ICBIR), Bangkok, 89-94. https://doi.org/10.1109/ICBIR.2018.8391172

Kalsi, S., Kaur, H., & Chang (2018). DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation. Journal of Medical Systems, 42(17). https://doi.org/10.1007/s10916-017-0851-z

Gupta, D. S., & Biswas, G. P. (2017). Design of lattice‐based ElGamal encryption and signature schemes using SIS problem. Wiley Online Library, https://doi.org/10.1002/ett.3255

Hardi, S. M., Tarigan, J. T., & Safrina, N. (2017). Hybrid Cryptosystem For Image File Using Elgamal And Double Playfair Cipher Algorithm. Journal of Physics: Conference Series, 978(1), 012068. https://doi.org/10.1088/1742-6596/978/1/012068

Soni, P., Ali, R., & Pal, A.K. (2017). A Two-factor based Remote User Authentication Scheme using ElGamal Cryptosystem. Proceedings of the ACM Workshop on Internet of Things (IoT) Security: Issues and Innovations, Article No. 3. https://doi.org/10.1145/3084030.3084031

Mawengkang, H., Siregar, A. F., & Efendi, S. (2018). Combination Analysis Of Elgamal Algorithm and LUC Algorithm In File Security. IOP Conference Series: Materials Science and Engineering, Volume 420, conference 1, https://doi.org/10.1088/1757-899x/420/1/012130

Jannati, H., & Bahrak, B. (2017). An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy. Wireless Personal Communications, 97(2), 3113–3123 https://doi.org/10.1007/s11277-017-4664-7

D. Rachmawati, A. S., Harahap, & Purba, R. N. (2018). A Hybird Cryptosystem Approach For Data Security By Using Triple DES Algorithm And Elgamal Algorithm. IOP Conference Series: Materials Science and Engineering, 453, 012018. https://doi.org/10.1088/1757-899x/453/1/012018

Downloads

Published

02-09-2021

How to Cite

[1]
admin admin, “Kerahasiaan Teks Basis Data MySQL Menggunakan Algoritma Elgamal”, jsisfotek, vol. 1, no. 4, pp. 66–72, Sep. 2021.

Issue

Section

Articles