Pengamanan Nama Customer Shopee melalui Kombinasi Algoritma Hill Cipher Modifikasi dan Rail Fence Cipher
DOI:
https://doi.org/10.22437/msa.v4i2.28865Keywords:
Shopee, Modified Hill Cipher , Rail Fence CipherAbstract
Science and technology development has made human activities turn into cyberspace activities, one of which is buying and selling. Shopee is one of the e-commerce platforms available. As an online-based platform, Shopee certainly stores lots of user data. Since August 1st, 2022, Shopee has made a policy regarding user data security by censoring the buyer’s name and phone number in the ordering process. This research discusses one way to secure buyer data through cryptography with the concept of super encryption. This concept itself combines more than one encryption method with the goal to create ciphertext that is difficult to solve. The chosen combination for this research is the modified Hill Cipher algorithm before proceeding with the Rail Fence Cipher encryption. Result obtained in this research is possible to be applied in Shopee buyer data security system, seen from the difficulty level of the ciphertext decryption.
Downloads
References
Bahasa, B. P. dan P. 2016. KBBI Daring. Diakses: 15 Oktober 2023, https://kbbi.kemdikbud.go.id/.
Contributors, W. 2023. Shopee. Diakses: 15 Oktober 2023, https://id.wikipedia.org/wiki/Shopee.
Ssu-yun, S., Chiang, E., & Hsin-yin, L. 2023. Shopee, Eslite bookstore fined following data leaks. Diakses: 16 Oktober 2023, https://focustaiwan.tw/society/202305300021.
Tim. 2022. Shopee Sensor Nama dan Nomor HP Pembeli bagi Penjual. Diakses: 15 Oktober 2023, https://www.cnnindonesia.com/ekonomi/20220808082920-92-831524/shopee-sensor-nama-dan-nomor-hp-pembeli-bagi-penjual.
Tim. 2022. Alasan Shopee Sensor Nama dan Nomor HP Pembeli dari Penjual. Diakses: 15 Oktober 2023, https://www.cnnindonesia.com/ekonomi/20220808142326-92-831739/alasan-shopee-sensor-nama-dan-nomor-hp-pembeli-dari-penjual.
Putra, P. P., & Toresa, D. 2021. Buku Ajar Keamanan Informasi Dan Jaringan Komputer. Pekanbaru: LPPM Universitas Lancang Kuning. Diambil dari http://repository.unilak.ac.id/id/eprint/2758%0Ahttps://repository.unilak.ac.id/2758/1/Buku Ajar 2021 - Keamanan informasi dan jaringan.pdf
Siregar, N., Faisal, I., & Handoko, D. 2022. Menerapkan Algoritma Hill Cipher dan Matriks 2x2 Dalam Mengamankan File Teks Menggunakan Kode ASCII. Jurnal Ilmu Komputer dan Sistem Informasi (JIRSI), 1(2), 70–83. Diambil dari https://jurnal.unity-academy.sch.id/index.php/jirsi/index70%0Ahttp://creativecommons.org/licenses/by-sa/4.0/
Hasugian, A. H. 2013. Implementasi Algoritma Hill Cipher dalam Penyandian Data. Pelita Informatika Budi Darma, IV(2), 115–122.
Dinata, S. J. 2020. Implementasi Algoritma Penyandian Transposisi Rail Fence pada Data Rekam Medis. Jurnal Informasi dan Teknologi Ilmiah (INTI), 7(3), 305–309. Diambil dari https://www.ejurnal.stmik-budidarma.ac.id/index.php/inti/article/view/2406
Fadlan, M., Bintari, E. D., & Tasya, A. 2023. Pengamanan Basis Data dengan Algoritma Transposisi Rail Fence. Jurnal Sistem Informasi dan Sistem Komputer, 8(2), 66–72. https://doi.org/10.51717/simkom.v8i2.135.
Wardani, I. E. 2013. Pemecahan Sandi Kriptografi dengan Menggabungkan Metode Hill Cipher dan Metode Caesar Chipher. CAUCHY: Jurnal Matematika Murni dan Aplikasi, 2(4), 232–236. https://doi.org/10.18860/ca.v2i4.3120.
Hariati, A., Hardiyanti, K., & Putri, W. E. 2018. Kombinasi Algoritma Playfair Cipher dengan Metode Zig-zag dalam Penyandian Teks. SinkrOn, 2(2), 13–17. Diambil dari https://jurnal.polgan.ac.id/index.php/sinkron/index
Fardianto, F. A. E., Yanto, F., Iskandar, I., & Pizaini, P. 2023. Kombinasi Algoritma Kriptografi Vigenere Cipher dengan Metode Zig-zag dalam Pengamanan Pesan Teks. Jurnal Computer Science and Information Technology (CoSciTech), 4(1), 182–192. https://doi.org/10.37859/coscitech.v4i1.4787.
Permanasari, Y. 2017. Kriptografi Klasik Monoalphabetic. Matematika, 16(1), 7–10. https://doi.org/10.29313/jmtm.v16i1.2543.
Stallings, W. 2011. Cryptography and Network Security: Principles and Practice. Computer Science Handbook, Second Edition. New York: Pearson Education. https://doi.org/10.1201/9781420057133.
Hamdani, D., & Junaidi, J. 2020. Modifikasi Karakter Kode pada Cipher Hill Menggunakan Kode ASCII. Eigen Mathematics Journal, 03(01), 23–28. https://doi.org/10.29303/emj.v3i1.54.
Contributors, W. 2022. ASCII. Diakses: 14 Oktober 2023, https://id.wikipedia.org/wiki/ASCII.
Cop, P., & Purnama, R. A. 2015. Sistem Keamanan E-Voting Menggunakan Algoritma Kode ASCII. Jurnal Teknik Komputer AMIK BSI, 1(1), 84–95.
Siahaan, A. P. U. 2016. Rail Fence Cryptography in Securing Information. International Journal of Scientific & Engineering Research, 7(7), 535–538.
Godara, S., Kundu, S., & Kaler, R. 2018. An Improved Algorithmic Implementation of Rail Fence Cipher. International Journal of Future Generation Communication and Networking, 11(2), 23–32. https://doi.org/10.14257/ijfgcn.2018.11.2.03.
Mubarak B, M. A., Salim, Y., & Sugiarti, S. 2022. Implementasi Metode Kriptografi Menggunakan Cipher Substitusi dan Cipher Transposisi pada Data Teks. Buletin Sistem Informasi dan Teknologi Islam, 3(1), 42–51. https://doi.org/10.33096/busiti.v3i1.960.