Pengamanan Nama Customer Shopee melalui Kombinasi Algoritma Hill Cipher Modifikasi dan Rail Fence Cipher

Authors

  • Laily Wadil Muqadas Departemen Matematika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Padjadjaran, Sumedang 45363
  • Sisilia Sylviani Departemen Matematika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Padjadjaran, Sumedang 45363
  • Edi Kurniadi Departemen Matematika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Padjadjaran, Sumedang 45363

DOI:

https://doi.org/10.22437/msa.v4i2.28865

Keywords:

Shopee, Modified Hill Cipher , Rail Fence Cipher

Abstract

Science and technology development has made human activities turn into cyberspace activities, one of which is buying and selling. Shopee is one of the e-commerce platforms available. As an online-based platform, Shopee certainly stores lots of user data. Since August 1st, 2022, Shopee has made a policy regarding user data security by censoring the buyer’s name and phone number in the ordering process. This research discusses one way to secure buyer data through cryptography with the concept of super encryption. This concept itself combines more than one encryption method with the goal to create ciphertext that is difficult to solve. The chosen combination for this research is the modified Hill Cipher algorithm before proceeding with the Rail Fence Cipher encryption. Result obtained in this research is possible to be applied in Shopee buyer data security system, seen from the difficulty level of the ciphertext decryption.

Downloads

Download data is not yet available.

References

Bahasa, B. P. dan P. 2016. KBBI Daring. Diakses: 15 Oktober 2023, https://kbbi.kemdikbud.go.id/.

Contributors, W. 2023. Shopee. Diakses: 15 Oktober 2023, https://id.wikipedia.org/wiki/Shopee.

Ssu-yun, S., Chiang, E., & Hsin-yin, L. 2023. Shopee, Eslite bookstore fined following data leaks. Diakses: 16 Oktober 2023, https://focustaiwan.tw/society/202305300021.

Tim. 2022. Shopee Sensor Nama dan Nomor HP Pembeli bagi Penjual. Diakses: 15 Oktober 2023, https://www.cnnindonesia.com/ekonomi/20220808082920-92-831524/shopee-sensor-nama-dan-nomor-hp-pembeli-bagi-penjual.

Tim. 2022. Alasan Shopee Sensor Nama dan Nomor HP Pembeli dari Penjual. Diakses: 15 Oktober 2023, https://www.cnnindonesia.com/ekonomi/20220808142326-92-831739/alasan-shopee-sensor-nama-dan-nomor-hp-pembeli-dari-penjual.

Putra, P. P., & Toresa, D. 2021. Buku Ajar Keamanan Informasi Dan Jaringan Komputer. Pekanbaru: LPPM Universitas Lancang Kuning. Diambil dari http://repository.unilak.ac.id/id/eprint/2758%0Ahttps://repository.unilak.ac.id/2758/1/Buku Ajar 2021 - Keamanan informasi dan jaringan.pdf

Siregar, N., Faisal, I., & Handoko, D. 2022. Menerapkan Algoritma Hill Cipher dan Matriks 2x2 Dalam Mengamankan File Teks Menggunakan Kode ASCII. Jurnal Ilmu Komputer dan Sistem Informasi (JIRSI), 1(2), 70–83. Diambil dari https://jurnal.unity-academy.sch.id/index.php/jirsi/index70%0Ahttp://creativecommons.org/licenses/by-sa/4.0/

Hasugian, A. H. 2013. Implementasi Algoritma Hill Cipher dalam Penyandian Data. Pelita Informatika Budi Darma, IV(2), 115–122.

Dinata, S. J. 2020. Implementasi Algoritma Penyandian Transposisi Rail Fence pada Data Rekam Medis. Jurnal Informasi dan Teknologi Ilmiah (INTI), 7(3), 305–309. Diambil dari https://www.ejurnal.stmik-budidarma.ac.id/index.php/inti/article/view/2406

Fadlan, M., Bintari, E. D., & Tasya, A. 2023. Pengamanan Basis Data dengan Algoritma Transposisi Rail Fence. Jurnal Sistem Informasi dan Sistem Komputer, 8(2), 66–72. https://doi.org/10.51717/simkom.v8i2.135.

Wardani, I. E. 2013. Pemecahan Sandi Kriptografi dengan Menggabungkan Metode Hill Cipher dan Metode Caesar Chipher. CAUCHY: Jurnal Matematika Murni dan Aplikasi, 2(4), 232–236. https://doi.org/10.18860/ca.v2i4.3120.

Hariati, A., Hardiyanti, K., & Putri, W. E. 2018. Kombinasi Algoritma Playfair Cipher dengan Metode Zig-zag dalam Penyandian Teks. SinkrOn, 2(2), 13–17. Diambil dari https://jurnal.polgan.ac.id/index.php/sinkron/index

Fardianto, F. A. E., Yanto, F., Iskandar, I., & Pizaini, P. 2023. Kombinasi Algoritma Kriptografi Vigenere Cipher dengan Metode Zig-zag dalam Pengamanan Pesan Teks. Jurnal Computer Science and Information Technology (CoSciTech), 4(1), 182–192. https://doi.org/10.37859/coscitech.v4i1.4787.

Permanasari, Y. 2017. Kriptografi Klasik Monoalphabetic. Matematika, 16(1), 7–10. https://doi.org/10.29313/jmtm.v16i1.2543.

Stallings, W. 2011. Cryptography and Network Security: Principles and Practice. Computer Science Handbook, Second Edition. New York: Pearson Education. https://doi.org/10.1201/9781420057133.

Hamdani, D., & Junaidi, J. 2020. Modifikasi Karakter Kode pada Cipher Hill Menggunakan Kode ASCII. Eigen Mathematics Journal, 03(01), 23–28. https://doi.org/10.29303/emj.v3i1.54.

Contributors, W. 2022. ASCII. Diakses: 14 Oktober 2023, https://id.wikipedia.org/wiki/ASCII.

Cop, P., & Purnama, R. A. 2015. Sistem Keamanan E-Voting Menggunakan Algoritma Kode ASCII. Jurnal Teknik Komputer AMIK BSI, 1(1), 84–95.

Siahaan, A. P. U. 2016. Rail Fence Cryptography in Securing Information. International Journal of Scientific & Engineering Research, 7(7), 535–538.

Godara, S., Kundu, S., & Kaler, R. 2018. An Improved Algorithmic Implementation of Rail Fence Cipher. International Journal of Future Generation Communication and Networking, 11(2), 23–32. https://doi.org/10.14257/ijfgcn.2018.11.2.03.

Mubarak B, M. A., Salim, Y., & Sugiarti, S. 2022. Implementasi Metode Kriptografi Menggunakan Cipher Substitusi dan Cipher Transposisi pada Data Teks. Buletin Sistem Informasi dan Teknologi Islam, 3(1), 42–51. https://doi.org/10.33096/busiti.v3i1.960.

Downloads

Published

2024-04-30

How to Cite

Muqadas, L. W. ., Sylviani, S. ., & Kurniadi, E. (2024). Pengamanan Nama Customer Shopee melalui Kombinasi Algoritma Hill Cipher Modifikasi dan Rail Fence Cipher. Mathematical Sciences and Applications Journal, 4(2), 46-53. https://doi.org/10.22437/msa.v4i2.28865