Penerapan Algoritma Rivest-Shamir-Adleman (RSA) pada Enkripsi Uniform Resource Locator (URL) Website untuk Keamanan Data

Theodora Tantri Trisnawati, Sherli Yurinanda, Wardi Syafmen, Cut Multahadah

Abstract


PT. Rezeki Surya Gasindo is a company that uses websites to store important company data, one of which is customer personal data. PT. Rezeki Surya Gasindo’s website is protected by a login system. However, a login system alone is not enough to protect the data stored on the website from cases of data theft by third parties. One solution to this problem is to encrypt the website's Uniform Resource Locator (URL) to increase the security level of data stored on the website. In this research, the Rivest-Shamir-Adleman (RSA) algorithm is used for the encryption process. The aim of this research is to determine the process of applying the Rivest-Shamir-Adleman (RSA) algorithm to the Uniform Resource Locator (URL) encryption of the PT. Surya Gasindo's website. The success of applying encryption with the RSA algorithm is observed from changes in the get parameter value that appears in the URL bar. The encrypted message is the customer, the get parameter in the Customer menu, which contains the consumer's personal data. By choosing two large prime numbers, namely 151 and 173, and taking one of the public keys/encryption keys, namely 16379, the result is that the get parameter in the URL bar has changed to the code string 5a9cb05811aa6e4c. The RSA algorithm has been successfully applied to the website URL.

Keywords


Website; Encryption; URL; RSA Algorithm

Full Text:

PDF

References


M. M. Purba and C. Rahmat, “Perancangan Sistem Informasi Stok Barang Berbasis Web di PT Mahesa Cipta,” JSI (Jurnal Sistem Informasi) Universitas Suryadarma, vol. 8, no. 2, pp. 123–158, 2021, doi: https://doi.org/10.35968/jsi.v8i2.721.

J. Saputra Irsandi, I. Fitri, N. D. Nathasia, and K. Kunci, “Sistem Informasi Pemasaran dengan Penerapan CRM (Customer Relationship Management) Berbasis Website menggunakan Metode Waterfall dan Agile,” Jurnal Teknologi Informasi dan Komunikasi), vol. 5, no. 4, p. 2021, 2021, doi: 10.35870/jti.

A. P. Aryani and L. E. Susanti, “Pentingnya Perlindungan Data Pribadi Konsumen dalam Transaksi Online pada Marketplace terhadap Kepuasan Konsumen,” Ahmad Dahlan Legal Perspective, vol. 2, no. 1, pp. 20–29, 2022, doi: https://doi.org/10.12928/adlp.v2i1.5610.

G. Susilo, “Keamanan basis data pada sistem informasi di era global,” Transformasi, vol. 12, no. 2, 2017, doi: https://doi.org/10.56357/jt.v12i2.70.

N. I. Putri, R. Komalasari, and Z. Munawar, “Pentingnya keamanan data dalam intelijen bisnis,” J-SIKA| Jurnal Sistem Informasi Karya Anak Bangsa, vol. 2, no. 02, pp. 41–48, 2020.

R. Andriyanto, K. Khairijal, and D. Satria, “Penerapan Kriptografi AES Class Untuk Pengamanan URL WEBSITE Dari Serangan SQL INJECTION,” Jurnal Unitek, vol. 13, no. 1, pp. 34–48, 2020, doi: https://doi.org/10.52072/unitek.v13i1.153.

I. P. A. E. Pratama, “Pengujian performansi lima back-end javascript framework menggunakan metode GET dan POST,” Jurnal Resti (Rekayasa Sistem dan Teknologi Informasi), vol. 4, no. 6, pp. 1216–1225, 2020, doi: https://doi.org/10.29207/resti.v4i6.2675.

U. D. R. Z. M. Luthfansa and U. D. U. Rosiani, “Pemanfaatan Wireshark untuk Sniffing Komunikasi Data Berprotokol HTTP pada Jaringan Internet,” Journal Information Engineering and Educational Technology) ISSN, vol. 2549, p. 869X, 2021.

CNN Indonesia, “10 Kasus Kebocoran Data 2022 : Bjorka Dominan, Ramai-Ramai Bantah,” 2022. Accessed: Mar. 15, 2023. [Online]. Available: https://www.google.com/amp/s/www.cnnindonesia.com/teknologi/20221230125430-192-894094/10-kasus

A. R. Kelrey and A. Muzaki, “Pengaruh Ethical Hacking Bagi Keamanan Data Perusahaan,” Cyber Security dan Forensik Digital, vol. 2, no. 2, pp. 77–81, 2019, doi: https://doi.org/10.14421/csecurity.2019.2.2.1625.

D. Ariyus, Pengantar Ilmu Kriptografi : Teori Analisis dan Implementasi. Yogyakarta: CV. ANDI Offset, 2008.

M. A. Al-Shabi, “A survey on symmetric and asymmetric cryptography algorithms in information security,” International Journal of Scientific and Research Publications (IJSRP), vol. 9, no. 3, pp. 576–589, 2019, doi: http://dx.doi.org/10.29322/IJSRP.X.X.2018.pXXXX.

M. Y. Simargolang, “Implementasi Kriptografi Rsa Dengan Php,” (JurTI) Jurnal Teknologi Informasi, vol. 1, no. 1, pp. 1–10, 2017.

R. Munir, Matematika Diskrit, 3rd ed. Bandung: INFORMATIKA Bandung, 2010.




DOI: https://doi.org/10.37905/euler.v11i2.21169

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Theodora Tantri Trisnawati, Sherli Yurinanda, Wardi Syafmen, Cut Multahadah

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.


Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi has been indexed by:


                         EDITORIAL OFFICE OF EULER : JURNAL ILMIAH MATEMATIKA, SAINS, DAN TEKNOLOGI

 Department of Mathematics, Faculty of Mathematics and Natural Science, Universitas Negeri Gorontalo
Jl. Prof. Dr. Ing. B. J. Habibie, Tilongkabila, Kabupaten Bone Bolango 96554, Gorontalo, Indonesia
 Email: euler@ung.ac.id
 +6287743200854 (WhatsApp Only)
 Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi (p-ISSN: 2087-9393 | e-ISSN:2776-3706) by Department of Mathematics Universitas Negeri Gorontalo is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.  Powered by Public Knowledge Project OJS.

slot gacor slot gacor hari ini slot gacor 2025 demo slot pg slot gacor slot gacor