Journal of Computer System and Informatics (JoSYC)
Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020

Implementasi Algoritma Camellia Pada Penyandian Record Database

Neti Rusri Yanti (Budi Darma)
Taronisokhi Zebua (Budi Darma)



Article Info

Publish Date
25 May 2020

Abstract

Database records in the form of text are very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of database records, it can be done by using cryptographic techniques. Cryptographic techniques can encode database records by encrypting them in the form of passwords that are not understood. The Camellia algorithm is one algorithm that can be relied upon to realize cryptographic techniques. This symmetry algorithm will produce a higher level of security against the database record because it can encode it into a password with a fairly complex process that will make it difficult for cryptanalysts to access the database. This research will use the 128 bit Camellia algorithm for the encryption and decryption process, so that in the process it is necessary to go through several long steps in order to produce the final cipher. This algorithm requires 18 rounds where every six rounds must enter Function F and Function FL-1 and also require as many as 26 subkeys, namely kw, k and kl. This study describes the process of securing a database record by encoding it based on the Camellia algorithm, so that it produces a text record database in the form of a password that is difficult for others to understand and understand. This is done in an effort to minimize acts of misuse of database records.

Copyrights © 2020






Journal Info

Abbrev

josyc

Publisher

Subject

Computer Science & IT Decision Sciences, Operations Research & Management Industrial & Manufacturing Engineering

Description

Journal of Computer System and Informatics (JoSYC) covers the whole spectrum of Artificial Inteligent, Computer System, Informatics Technique which includes, but is not limited to: Soft Computing, Distributed Intelligent Systems, Database Management and Information Retrieval, Evolutionary ...