Perancangan Dan Implementasi Caesar Chiper Untuk Meningkatkan Keamanan Sistem Informasi Akademik Sekolah Berbasis Android
DOI:
https://doi.org/10.61132/saturnus.v2i3.205Keywords:
Caesar Cipher, Data Security, Academic Information Systems, Android, Encryption.Abstract
This research focuses on the design and implementation of the Caesar Cipher method to improve the security of an Android-based School Academic Information System. In this digital era, data security is a major concern, especially in school academic information systems that manage important data. The Caesar Cipher method, as a simple and easy to implement encryption technique, is used in this research. The research results show that the implementation of Caesar Cipher has succeeded in increasing data security in the system. While this method does not provide a very high level of security, it can be part of a more complex security approach. Overall, this research shows that the design and implementation of Caesar Cipher is an effective step in improving the security of Android-based school academic information systems.
References
Beal, V. (n.d.). What is Caesar Cipher? Webopedia Definition. Webopedia. Retrieved January 16, 2024, from https://www.webopedia.com/definitions/caesar-cipher/
Kurose, J. F., & Ross, K. W. (2012). Computer Networking: A Top-Down Approach. 6th ed. Pearson.
Sharma, V., & Gupta, G. P. (2015). Android application development for GPS based location tracker & NITR attendance management system. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 67-72.
Singh, Y., & Gupta, B. B. (2014). Caesar Cipher: An Ancient Data Encryption Technique. International Journal of Advanced Research in Computer Science and Software Engineering, 4(1), 396-399.
Stallings, W. (2013). Cryptography and Network Security: Principles and Practice. 6th ed. Pearson.
Sweeney, L. (2002). K-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557-570.
Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: threats and challenges. Security and Communication Networks, 7(12), 2728-2742.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Saturnus : Jurnal Teknologi dan Sistem Informasi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.