Implementation of RSA Cryptography Algorithm in Data Encryption for Location Manipulation Based on IP Address

Penulis

  • Muhammad Bintang Harahap Universitas Muhammadiyah Sumatera Utara Penulis
  • Amrullah Universitas Muhammadiyah Sumatera Utara Penulis

Kata Kunci:

Data Security, Geolocation, IP Address, RSA Algorithm

Abstrak

This research enhances data security for geolocation information derived from IP addresses using RSA encryption. In today’s digital era, protecting sensitive data is crucial, as personal information is often transferred and stored electronically. Encryption is a key security method that transforms readable data (plaintext) into unreadable code (ciphertext) without the correct decryption key, thereby safeguarding it from unauthorized access. The RSA algorithm, specifically with a 2048-bit key length, has proven effective in securing geolocation data against brute-force attacks, ensuring that only authorized users with the correct decryption key can access the information. This study confirms that RSA encryption allows encrypted geolocation data to be stored safely in databases, maintaining data confidentiality and integrity. Ultimately, this research contributes to the understanding of RSA cryptography's application in data encryption for IP-based location data, offering a reliable method to prevent data manipulation and unauthorized access.

Referensi

Ade, B. (2022). Rancang Bangun Sistem Absensi Berbasis Face Id di Bank Mandiri Sungai Rumbai dengan Bahasa Pemograman Python. Journal of Vocational Education and Information Technology (JVEIT), 3(2), 65–70. https://doi.org/10.56667/jveit.v3i2.715

Andika, S. (2021). Implementasi Algoritma Freivlds Untuk Pembangkitan Kunci AlgoritmaRSA Pada Pengamanan Data Video. Pelita Informatika : Informasi dan Informatika, 10(2), 70–77.

Ardhiansyah, M., Noris, S., & Andrianto, R. (2020). Modul Jaringan Komputer Universitas Pamulang (Nomor 1).

Chafid, N., & Soffiana, H. (2022). Impelementasi Algoritma Kriptografi Klasik Caesar Untuk Rancang Bangun Aplikasi E-Voting Berbasis Web (Studi Kasus : Sman 10 Tangerang). Jurnal Ilmiah Sains dan Teknologi, 6(2), 133–145. https://doi.org/10.47080/saintek.v6i2.2249

Fauzi, R. (2023). Implementasi Algoritma Kriptografi Elgamal Untuk Pesan Rahasia Berbasis Web Di Markas Pmi Kota Tangerang. 50 |Jurnal Ilmu Komputer JIK, VI(03), 50–54.

Feraldi, R., Khairuna, A., Hasan, M. A., Rezky, R., & Ramadhan, H. (2021). Kombinasi Algoritma Kriptografi Caesar Cipher Dan Permutation Cipher Untuk Pesan Teks Menggunakan Python. Riau Journal of Computer Science, 7(1), 76–86.

Harun Alfirdaus, M., Tahir, M., Enno Dewanti, N., Ardianto, R., Nur Azurah, N., Firman Cahyono, N., & Informatika, P. (2023). Perancangan Aplikasi Enkripsi Deskripsi Mengunakan Metode Caesar Chiper Berbasis Web. Jtmei), 2(2), 64–76.

Ii, B. A. B., & Teori, L. (2016). android yang diberi nama Gerbang Otomatis.apk. Dihubungkan dengan. 2014, 7–16.

Ilmiah, J., & Indonesia, M. (2023). Mutiara. 1(1), 204–214.

Rezki, R., & Siahaan, R. F. (2021). Rancang Bangun Sistem Keamanan Data Digital dengan Metode RSA Berbasis Dekstop. Jurnal Mahajana Informasi, 6(2), 32–40.

Rumetna, M. S. (2021). Kombinasi Gnu Privacy Guard Dan Hamming Distance Untuk Keamanan Email Serta Jalur Sertifikasi Combination of Gnu Privacy Guard and Hamming Distance for Email Security and Certification Paths. Elektro Luceat [November], 7(2), 151–160.

Studi, P., Informatika, T., Sains, F., Teknologi, D. A. N., Islam, U., & Syarif, N. (2021). Evaluasi Kinerja Routing Protocol Ripng Dan Ospfv3 Pada Ipv6 Menggunakan Protocol Fhrp ( Hsrp Dan Glbp ).

TRIANA, F. (2020). Implementasi Caesar Cipher Cryptography Dan Least Significant Bit-2 (Lsb-2) Steganography Untuk Keamanan Data Berbasis …. 8–42. http://eprints.polsri.ac.id/10054/

Ulfah Indriani, Ommi Alfina, N. S. (2021). Penerapan Algoritma Rsa Dan Affine Cipher Dalam Keamanan File Ms Word. 01(02), 95–100. http://repository.potensi-utama.ac.id/jspui/handle/123456789/5074

Waruwu, S. H., & Hondro, R. K. (2024). Analisis dan Implementasi Modifikasi Algoritma Kriptografi GOST Menggunakan Blum Blum Shub Generator Pada Sistem Pengamanan Login Pada Website. 01(03), 30–46.

Martiano, M., & Sary, Y. Cryptography Generator for Prevention SQL Injection Attack In Big Data.

Syaifuddin, M., Amrullah, A., Ginting, R. I., Iswan, M., & Hutagalung, J. (2022). Project-based learning on cryptographic using lms. JURTEKSI (Jurnal Teknologi dan Sistem Informasi), 8(2), 147-152.

Hafizah, H., Tugiono, T., Panjaitan, Z., Amrullah, A., & Setiawan, D. (2023). APPLICATION OF THE MOORA METHOD IN THE DECISION SUPPORT SYSTEM FOR SELECTING THE BEST FONT AUTHORS ON ABLY CREATIVE FONT. Journal of Science and Social Research, 6(1), 255-262.

Syafutra, T. R., Khairil, K., & Suryana, E. (2022). The Implementation Of Modern Cryptography On Document Data Security. Jurnal Media Computer Science, 1(2), 287-294. [20] Ii, B. A. B. (2021). Bab ii tinjauan pustaka. Dm, 7–23.

Sari, M., Purnomo, H. D., & Sembiring, I. (2022). Cryptographic Algorithm for SMS Security System on Android. Journal of Information Technology, 2(1), 11-15.

Abella, F. A. (2022). IMPLEMENTATION OF CRYPTOGRAPHY USING AES-128 ALGORITHM. Jurnal Ilmu Komputer (JIKOMP), 1(1).

Permana, A. A., & Nurnaningsih, D. (2020). Application Of Cryptography With Data Encryption Standard (Des) Algorithm In Picture. JIKA (Jurnal Informatika), 4(2), 82-87.

Kuncoro, A. P., Mustofa, D., Krisbiantoro, D., & Tarwoto, T. (2023). DIGITAL DATA SECURITY WITH APPLICATION OF CRYPTOGRAPHY AND DATA COMPRESSION TECHNIQUES. Jurnal Teknik Informatika (Jutif), 4(5), 995-999. [24] Di, B., Bangunan, T., Mas, A., Algoritma, M., Saputra, A., Sari, H. L., & Sartika, D. (2023). Implementasi Metode Association Rule Mining Pada Penjualan. 2(4), 709–718.

Royani, M. R., & Wibowo, A. (2020). Web service implementation in logistics company uses JSON web token and RC4 cryptography algorithm. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 4(3), 591-600.

Yuniati, T. (2020). Secure Electronic Payment Methods for Online Shopping Based on Visual Cryptography. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 4(2), 319-328.

Diterbitkan

2024-11-01

Cara Mengutip

Harahap, M. B., & Amrullah. (2024). Implementation of RSA Cryptography Algorithm in Data Encryption for Location Manipulation Based on IP Address. Journal of Technology and Computer, 1(4), 1-8. https://journal.technolabs.co.id/index.php/jotechcom/article/view/28

Artikel paling banyak dibaca berdasarkan penulis yang sama

1 2 3 4 > >>