ac

The Implementation of the RC4 algorithm For Sale and Purchase Agreements Data Security On Notary Office

Authors

  • Trisna Setiawaty STMIK Pelita Nusantara, Medan
  • Olven Manahan STMIK Pelita Nusantara, Medan

DOI:

10.47709/cnapc.v2i1.354

Keywords:

Cryptography, Encryption and Decryption, RC4

Dimension Badge Record



Abstract

Ksecurity wheel is one of the essential needs of the data, or information. With this regard the importance of the information or data by the party or person of interest. This research aims to design and build a system for data security deed of sale that can help the Notary / PPAT. The system was built using the RC4 (Rivest Code 4) which is a symmetric key cryptographic algorithms and is stream cipher, there is a process of encryption and decryption. The encryption is the process of encoding the original message or plaintext into ciphertext encrypted text. While decryption is the process of encoding back to cipherteksmenjadiplainteks (original data). This research resulted in a system that is able to change the data that can be read into the data that is not easily understood.

Downloads

Download data is not yet available.
Google Scholar Cite Analysis
Abstract viewed = 112 times

References

[1] Andi. 2008. "Microsoft Visual Basic 6.0 for beginners" .yogyakarta: Andi.
[2] Home Agency. 2011. "Security Total Data and Important Information". PT.ElexMedia Komputindo.
[3] Basri. "Symmetric and Asymmetric Cryptography In danKompleksitas Computing Data Security Perspective", Journal of Scientific Computer Science, 2016, 2 (2).
[4] Kurniadi, Irwansyah, Fatmasari. "The implementation of the RC4 algorithm to encrypt data security" .2015.
[5] Marbun pure. "The implementation of a data security system of goods at PT. MatahariPutra Prima, TBK ", Journal Mantik Penusa, 2015, 18 (2).
[6] Rosa United States, and Msalahudin. 2018. "Software Engineering".
[7] Ruri Hartika Zain. "The design and implementation of the RC4 algorithm cryptograpy method on the type of document file using Visual Basic 6.0 programming language" Momentum .Jurnal, 2012.12 (1), 71-80.
[8] Sukma Rizqi Kharisma, Muhammad Aziz Fatchu Rchman. "Making Application Notes Using Polyalphabetic Substitution Cipher Cryptographic Algorithms The combination of ASCII codes and Android-Based XOR operations". Journal of Information Technology, 2017, XII (35).
[9] Wikipedia, The Free Encyclopedia, (2019, April 23) "Flow Chart". Be identified May 31, 2019, from https://id.wikipedia.org/w/index.php?title=Diagram_alir&oldid=15019984

Downloads

ARTICLE Published HISTORY

Submitted Date: 2019-11-06
Accepted Date: 2019-11-06
Published Date: 2020-01-01

How to Cite

Setiawaty, T., & Manahan, O. (2020). The Implementation of the RC4 algorithm For Sale and Purchase Agreements Data Security On Notary Office. Journal of Computer Networks, Architecture and High Performance Computing, 2(1), 38-44. https://doi.org/10.47709/cnapc.v2i1.354