ARTICLE
TITLE

ALGORITMA BLOWFISH UNTUK MENINGKATKAN KEAMANAN DATABASE MYSQL

SUMMARY

The limitations of humans to maintain the security and confidentiality of stored data can have a bad impact if it is used by unauthorized parties. One way to secure shipping is to convert data into one that is not understood by encoding and insertion using cryptographic techniques. Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is a modern cryptographic algorithm symmetrical key shaped block cipher. The Blowfish algorithm is quite simple but strong enough because it has a long key space, making it difficult to attack. Encryption is done by using a certain key, so as to produce ciphertext (files that have been encrypted or encoded) that cannot be read or understood. The ciphertext can be restored as if it was decrypted using the same key when encrypting the file. The key length used can affect the security of the algorithm. The decryption flow is almost the same as the Blowfish Algorithm encryption, except in the P-array (P1, P2, …… .., P18) done by invading. Information of a system is certainly stored in a database that is always possible to attack, but using cryptography then the problem can be overcome. By using the Blowfish algorithm, information security in a MySQL database can be improved. Keywords: Cryptography, Blowfish Algorithm, Block Cipher, Ciphertext, Encryption, Decryption, MySQL

 Articles related

Budi Wijaya Rauf    

Abstract - To secure data, cryptographic techniques are needed, but many cryptographic methods are vulnerable that require attacks. But not with the Blowfish method which includes a symmetric key algorithm that has the same key to encrypt and decrypt dat... see more


Waode Hardianas Shalawati,Muhammad Yamin,Natalis Ransi    

Security of a website is a very important aspect. Because unsafe websites will easily be damaged the integrity of the data  and information through various attack. SQL Injection is one type of attack that often occurs on websites. SQL Injection is a... see more

Revista: semanTIK

Ferdy Riza, Nurmala Sridewi, Amir Mahmud Husein, Muhammad Khoiruddin Harahap    

The ease of sending data with the development of internet technology technology is now a concern, especially the problem of data confidentiality, integrity and information security. Cryptography is one of the techniques used to maintain data confidential... see more


Mujito Mujito,Anugrah Bagus Susilo    

Dinas kependudukan Dan Pencatatan Sipil Kota Tangerang Selatan adalah suatu instansi pemerintah yang menangani masalah kependudukan dan catatan sipil warga daerah Tangerang data-data pencatatan sipil meliputi data akte pernikahan, data akte kelahiran dan... see more


Sasono Wibowo,Suprayogi Suprayogi    

Seiring berkembangnya Teknologi Informasi yang sangat pesat dan semakin mudahnya orang untuk melakukan komunikasi maka permasalahan barupun muncul dalam bidang penyampaian informasi dan komunikasi, karena kemudahan pengaksesan media komunikasi oleh semua... see more

Revista: Techno.Com