ARTICLE
TITLE

Penambahan Register pada Form Login Aplikasi Master Data KBM dengan Metode Kriptografi AES DOI: 10.32493/informatika.v7i2.22060

SUMMARY

Incorrectly designed login forms can result in malicious credentials being exploited to gain unauthorized access. Designing the appearance of the form is enough to have a role so as not to make the user confused when faced with the login form page. In order to make it easier for users to access certain pages, the user must register first. Register also means the registration process (in the register) or system, with the display of the register on the login form, it will make it easier for users to register individually so that they can enter the application. Because previously the KBM master data login form application did not have a register, the author added a register form on the KBM master data application login form page, and needed to add another label that served as a link to the member registration menu that we had created. To do so, click the Standard tab > Labels (StdCtrls), then change the text on the Properties tab. B. "Click here to register on the registration form (Whida, 2018). After testing the login application and the added registration form, the test did not detect any errors and passed all tests. The results according to this test can be used as a reference to improve your application in sync using what is needed and to ensure that the application we develop works as expected. With the development of the KBM master data application, security needs to be implemented as well, such as the vehicle database in the KBM master data Not guaranteed and there is always a risk of misuse of the KBM Master Data. To mitigate this, Master Data can be protected by using Shuffle Technologies (Cryptography, Encryption). Cryptography is sensitive information and is intended to prevent the use of information transmitted over networks such as LANs and the Internet. Known and used by other people and unauthorized parties. Encryption is a method of encoding a message or information into unreadable text and is closely related to encryption, which is a method to protect a message from being read by third parties. In this study, the author uses the Advanced Encryption Standard (AES) algorithm to create a PHP source code encryption application. The AES algorithm was chosen to provide a high level of security. The development of this registration form uses the AES cryptography method, the results of the development of this registration form have been tested and run well.

 Articles related

Agus Suharto,Mardiana Mardiana    

Abstract - STMIK Eresha has a Facebook group site called "Kabar Eresha", where the site is a means of exchanging information about lectures. However, this information has not been conveyed properly, because the Kabar Eresha group is closed and not all ST... see more


Budi Tri Utomo,Iskandar Fitri,Eri Mardiani    

In the era of big data, the biometric identification process is growing very fast and is increasingly being implemented in many applications. Face recognition technology utilizes artificial intelligence (AI) to recognize faces that are already stored in ... see more

Revista: Jurnal JTIK KITA

- Sumardi,- Pramesti    

Salah satu kegiatan Posyandu adalah untuk memonitoring gizi anak pada daerah sekitarnya. Memonitoring dilakukan oleh Kader Posyandu dengan mencatat dan melaporkan sesuai dengan format yang diberikan oleh puskesmas. Informasi yang dihasilkan berupa status... see more

Revista: Techno.Com

Agus Sulaiman    

In this modern era, internet technology and information system are very crucial in helping people or companies running their business. The latest technology allows people to buy and sell online using an electronic system that is known as e-commerce. Admi... see more

Revista: Ultima Infosys

Yu Shin Shuen,Nureize Arbaiy,Yusmadi Yah Jusoh    

A banana is a nutritious fruit which contains good vitamins and nutrient for body. Banana tree requires suitable mean temperature and mean rainfall to grow up. Additionally, healthy soil improves crops growth due to sufficient nutrients. Farmers use fert... see more