APLIKASI PENGAMANAN BASIS DATA MENGGUNAKAN ALGORITMA XXTEA

Theft of data derived from database backups can be a loophole in data security. These loopholes can be avoided by securing using cryptography on data backup files. So unauthorized parties cannot exploit loopholes to misuse data. The method that the author uses in this final task is the encryption me...

Full description

Saved in:
Bibliographic Details
Main Author: Raden Sangunda Marga, (Author)
Format: Book
Published: 2021-02-14.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_9311
042 |a dc 
100 1 0 |a Raden Sangunda Marga, .  |e author 
245 0 0 |a APLIKASI PENGAMANAN BASIS DATA MENGGUNAKAN ALGORITMA XXTEA 
260 |c 2021-02-14. 
500 |a http://repository.upnvj.ac.id/9311/13/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/9311/14/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/9311/3/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/9311/4/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/9311/9/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/9311/5/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/9311/10/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/9311/7/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/9311/12/DAFTAR%20RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/9311/8/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/9311/15/HASIL%20CEK%20TURNITIN.pdf 
500 |a http://repository.upnvj.ac.id/9311/11/ARTIKEL%20KI.pdf 
520 |a Theft of data derived from database backups can be a loophole in data security. These loopholes can be avoided by securing using cryptography on data backup files. So unauthorized parties cannot exploit loopholes to misuse data. The method that the author uses in this final task is the encryption method using the XXTEA Algorithm. Encryption is the name of a process where it scrambles the data contained in a file or message. So it is difficult to know the contents of the data if you do not know the specific password. The XXTEA algorithm is a symmetric cryptographic algorithm that uses the same key to perform encryption and decryption processes. This research resulted in an application utilizing XXTEA algorithm and PHP 7.3 programming language. Hasil trial that the author did, generated in the form of a file with sql format that has been encrypted and has a key. The database file can be decrypted by using the same key in the encryption process. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a Q Science (General) 
690 |a QA76 Computer software 
690 |a T Technology (General) 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/9311/ 
787 0 |n https://repository.upnvj.ac.id/ 
856 4 1 |u http://repository.upnvj.ac.id/9311/  |z Link Metadata