Perancangan Dan Implementasi Caesar Chiper Untuk Meningkatkan Keamanan Sistem Informasi Akademik Sekolah Berbasis Android

Authors

  • Alif Azhar Amsyari Universitas Potensi Utama
  • Bayu Gunawan Universitas Potensi Utama
  • Rizky Hamdani Universitas Potensi Utama
  • Sri Panca Rani Universitas Potensi Utama
  • Nita Syahputri Universitas Potensi Utama

DOI:

https://doi.org/10.61132/saturnus.v2i3.205

Keywords:

Caesar Cipher, Data Security, Academic Information Systems, Android, Encryption.

Abstract

This research focuses on the design and implementation of the Caesar Cipher method to improve the security of an Android-based School Academic Information System. In this digital era, data security is a major concern, especially in school academic information systems that manage important data. The Caesar Cipher method, as a simple and easy to implement encryption technique, is used in this research. The research results show that the implementation of Caesar Cipher has succeeded in increasing data security in the system. While this method does not provide a very high level of security, it can be part of a more complex security approach. Overall, this research shows that the design and implementation of Caesar Cipher is an effective step in improving the security of Android-based school academic information systems.

References

Beal, V. (n.d.). What is Caesar Cipher? Webopedia Definition. Webopedia. Retrieved January 16, 2024, from https://www.webopedia.com/definitions/caesar-cipher/

Kurose, J. F., & Ross, K. W. (2012). Computer Networking: A Top-Down Approach. 6th ed. Pearson.

Sharma, V., & Gupta, G. P. (2015). Android application development for GPS based location tracker & NITR attendance management system. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 67-72.

Singh, Y., & Gupta, B. B. (2014). Caesar Cipher: An Ancient Data Encryption Technique. International Journal of Advanced Research in Computer Science and Software Engineering, 4(1), 396-399.

Stallings, W. (2013). Cryptography and Network Security: Principles and Practice. 6th ed. Pearson.

Sweeney, L. (2002). K-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557-570.

Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: threats and challenges. Security and Communication Networks, 7(12), 2728-2742.

Published

2024-07-03

How to Cite

Alif Azhar Amsyari, Bayu Gunawan, Rizky Hamdani, Sri Panca Rani, & Nita Syahputri. (2024). Perancangan Dan Implementasi Caesar Chiper Untuk Meningkatkan Keamanan Sistem Informasi Akademik Sekolah Berbasis Android. Saturnus : Jurnal Teknologi Dan Sistem Informasi, 2(3), 151–161. https://doi.org/10.61132/saturnus.v2i3.205

Similar Articles

<< < 1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.