Penerapan Kriptografi untuk Pengamanan Data Nilai Siswa dengan Algoritma Super Enkripsi


Authors

  • Jefry G G Saragih Universitas Budi Darma, Medan, Indonesia

DOI:

https://doi.org/10.64366/adajisr.v2i2.78

Keywords:

Cryptography; Vigenere; Column Trasposition; Encryption; Message Security; Super Encryption

Abstract

This study discusses the application of cryptography using the super-encryption method as a solution for securing student grade data at SMA Negeri 5 Medan, which still relies on manual systems and is therefore vulnerable to manipulation and data leakage. Super-encryption was chosen because it combines two cipher techniques to strengthen security, with the Vigenere Cipher algorithm employed as one of the methods for both encryption and decryption processes. The research stages include literature review, system requirements analysis, architecture and algorithm design, application implementation, testing, and result documentation. The encryption process successfully transformed the plaintext of student grades into ciphertext that is difficult for unauthorized parties to interpret, while the decryption process accurately restored the ciphertext to its original form using the same key. The testing results indicate that this method ensures the confidentiality and integrity of academic data while enhancing the security of multi-user information systems. Thus, this research emphasizes that implementing super-encryption in student grade management systems not only protects privacy and data authenticity but also serves as a strategic solution to address cybersecurity threats in the field of education.

Downloads

Download data is not yet available.

References

S. Chandra, S. Bhattacharyya, S. Paira, and S. Alam, “A study and analysis on symmetric cryptography,” in 2014 International Conference on Science Engineering and Management Research (ICSEMR), 2014, pp. 1–8. doi: 10.1109/ICSEMR.2014.7043664.

J. Kapoor and D. Thakur, “Analysis of symmetric and asymmetric key algorithms,” in ICT analysis and applications, Springer, 2022, pp. 133–143. doi: https://doi.org/10.1007/978-981-16-5655-2_13.

V. Rudnytskyi, O. Korchenko, N. Lada, R. Ziubina, L. Wieclaw, and L. Hamera, “Cryptographic encoding in modern symmetric and asymmetric encryption,” Procedia Comput. Sci., vol. 207, pp. 54–63, 2022, doi: https://doi.org/10.1016/j.procs.2022.09.037.

F. D. Yonathan, H. Nasution, and H. Priyanto, “Aplikasi Pengaman Dokumen Digital Menggunakan Algoritma Kriptografi Hybrid dan Algoritma Kompresi Huffman,” JEPIN (Jurnal Edukasi dan Penelit. Inform., vol. 7, no. 2, pp. 181–195, 2021, doi: https://doi.org/10.26418/jp.v7i2.47077.

H. Putri, L. Virna, T. Febrianti, and T. Sutabri, “Pengamanan Data Transmisi Aplikasi Web Menggunakan Algoritma Kriptografi RSA: Studi Kasus dan Analisis,” J. Manaj. Inform. Teknol., vol. 5, no. 1, pp. 153–170, 2025, doi: https://doi.org/10.51903/rdbsne23.

Z. Arif and A. Nurokhman, “Analisis Perbandingan Algoritma Kriptografi Simetris Dan Asimetris Dalam Meningkatkan Keamanan Sistem Informasi,” J. Teknol. Sist. Inf., vol. 4, no. 2, pp. 394–405, 2023, doi: https://doi.org/10.35957/jtsi.v4i2.6077.

S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, “Security of internet of things based on cryptographic algorithms: a survey,” Wirel. Networks, vol. 27, no. 2, pp. 1515–1555, 2021, doi: https://doi.org/10.1007/s11276-020-02535-5.

N. Febitri, H. Witriyono, M. Muntahanah, and M. Marhalim, “Application of AES 256 Cryptography Algorithm OCB Mode on Student Data,” J. Komputer, Inf. dan Teknol., vol. 3, no. 2, pp. 423–432, 2023, doi: https://doi.org/10.53697/jkomitek.v3i2.1478.

L. Judijanto, P. D. Persadha, I. Susilowati, H. K. Reza, and M. Susanti, “Analisis Keamanan Data dan Perlindungan Privasi dalam Pengelolaan Big Data: Tinjauan Teknologi Enkripsi dan Anonimisasi,” J. Penelit. Inov., vol. 5, no. 2, pp. 991–1000, 2025, doi: https://doi.org/10.54082/jupin.1151.

C. Ko?cielny, M. Kurkowski, and M. Srebrny, “Foundations of symmetric cryptography,” in Modern Cryptography Primer: Theoretical Foundations and Practical Applications, Springer, 2013, pp. 77–118. doi: https://doi.org/10.1007/978-3-642-41386-5_3.

B. Mandal, S. Chandra, S. S. Alam, and S. S. Patra, “A comparative and analytical study on symmetric key cryptography,” in 2014 international conference on electronics, communication and computational engineering (ICECCE), IEEE, 2014, pp. 131–136. doi: 10.1109/ICECCE.2014.7086646.

R. A. Manurung, S. Sutarman, and S. Efendi, “Comparative Analysis of the Performance of Four Symmetric Algorithms on Digital File Security,” J. INFORMATICS Telecommun. Eng., vol. 8, no. 2, pp. 152–164, 2025, doi: 10.31289/jite.v8i2.13978.

V. Kapoor and R. Gupta, “Hybrid symmetric cryptography approach for secure communication in web application,” J. Discret. Math. Sci. Cryptogr., vol. 24, no. 5, pp. 1179–1187, 2021, doi: https://doi.org/10.1080/09720529.2021.1936900.

S. E. Noor, A. Ahmad, M. V. Martos Núñez, and M. J. Hornos Barranco, “Learning the basics of cryptography with practical examples,” REIDOCREA, vol. 11, no. 24, pp. 274–281, 2022, doi: http://dx.doi.org/10.30827/Digibug.74740.

A. Abuzaid, X. Yuan, H. Yu, and B. Chu, “The Design and Implementation of a Cryptographic Education Tool.,” in 3rd International Conference on Computer Supported Education, 2011, pp. 193–198. doi: 10.5220/0003301301930198.

P. . Chakravarthy and T. Anjikumar, “A Novel Symmetric Key Cryptography using Multiple Random Secret Keys,” Int. J. Comput. Appl., vol. 80, no. 16, pp. 27–32, 2013, doi: 10.5120/13954-1890.

M. B. Yassein, S. Aljawarneh, E. Qawasmeh, W. Mardini, and Y. Khamayseh, “Comprehensive study of symmetric key and asymmetric key encryption algorithms,” in 2017 international conference on engineering and technology (ICET), IEEE, 2017, pp. 1–7. doi: 10.1109/ICEngTechnol.2017.8308215.

A. S. Ellapalli and S. Varadarajan, “Information security with cryptography symmetric key encryption algorithms: a survey,” I-Manager’s J. Commun. Eng. Syst., vol. 11, no. 1, p. 19, 2022, doi: 10.26634/jcs.11.1.18913.

D. A. Meko, “Perbandingan Algoritma DES, AES, IDEA Dan Blowfish dalam Enkripsi dan Dekripsi Data,” J. Teknol. Terpadu, vol. 4, no. 1, pp. 8–15, 2018, doi: https://doi.org/10.54914/jtt.v4i1.110.

M. Abudalou, “Enhancing Data Security through Advanced Cryptographic Techniques,” Int. J. Comput. Sci. Mob. Comput., vol. 13, no. 1, pp. 88–92, 2024, doi: https://doi.org/10.47760/ijcsmc.2024.v13i01.007.

S. Naeem, “Network security and cryptography challenges and trends on recent technologies,” J. Appl. Emerg. Sci., vol. 13, no. 1, pp. 1–8, 2023, doi: http://dx.doi.org/10.36785/jaes.131546.

R. Hazra, P. Chatterjee, Y. Singh, G. Podder, and T. Das, “Data encryption and secure communication protocols,” in Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning, IGI Global, 2024, pp. 546–570. doi: 10.4018/979-8-3693-6557-1.ch022.

R. Banoth and R. Regar, “Asymmetric Key Cryptography,” in Classical and Modern Cryptography for Beginners, Springer, 2023, pp. 109–165. doi: https://doi.org/10.1007/978-3-031-32959-3_4.

M. S. Al-Batah, M. S. Alzboon, M. Alzyoud, and N. Al-Shanableh, “Enhancing image cryptography performance with block left rotation operations,” Appl. Comput. Intell. Soft Comput., vol. 2024, no. 1, pp. 1–19, 2024, doi: https://doi.org/10.1155/2024/3641927.

C. Ubochi, B. Olaniyi, K. Ukagwu, and S. Nnamchi, “A comparative analysis of symmetric cryptographic algorithm as a data security tool: A survey,” NIPES-Journal Sci. Technol. Res., vol. 5, no. 3, pp. 144–168, 2023, doi: https://doi.org/10.5281/zenodo.8313097.

A. Yeboah-Ofori, C. K. Agbodza, F. A. Opoku-Boateng, I. Darvishi, and F. Sbai, “Applied cryptography in network systems security for cyberattack prevention,” in 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), IEEE, 2021, pp. 43–48.

S. Windarta, S. Suryadi, K. Ramli, B. Pranggono, and T. S. Gunawan, “Lightweight cryptographic hash functions: Design trends, comparative study, and future directions,” Ieee Access, vol. 10, pp. 82272–82294, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3195572.

S. M. S. Eldin et al., “Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences,” IEEE Access, vol. 11, pp. 101694–101709, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3298545.

S. Bahri, F. Jihan, and B. Rudianto, “Implementasi Algoritma Super Enkripsi Vigenere Cipher Dan Route Cipher Pada Penyandian Pesan Teks,” J. Mat. UNAND, vol. 12, no. 2, pp. 168–175, 2023, doi: https://doi.org/10.25077/jmua.12.2.168-175.2023.

A. M. Supriyatno and E. Ardhianto, “Peningkatan Keamanan Pesan Teks Menggunakan Super Enkripsi Algoritma Caesar Cipher Standard Dan Vigenere Autokey,” J. Ilm. KOMPUTASI, vol. 23, no. 2, pp. 167–172, 2024, doi: https://doi.org/10.32409/jikstik.23.2.3602.

N. B. Putra, B. C. Andika, A. D. Purba, and M. Ridwan, “Implementasi Sandi Vigenere Cipher dalam Mengenkripsikan Pesan,” JOCITIS-Journal Sci. Infomatica Robot., vol. 1, no. 1, pp. 42–50, 2023, doi: https://jurnal.ittc.web.id/index.php/jct/article/view/25.

I. Riadi, A. Fadlil, and F. A. Tsani, “Pengamanan citra digital berbasis kriptografi menggunakan algoritma Vigenere Cipher,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 7, no. 1, pp. 33–45, 2022, doi: https://doi.org/10.14421/jiska.2022.7.1.33-45.

A. H. Hasugian, “Implementasi Algoritma Vigenere Cipher Untuk Keamanan Data Bantuan Sosial Di Desa,” Bull. Comput. Sci. Res., vol. 5, no. 4, pp. 317–328, 2025, doi: https://doi.org/10.47065/bulletincsr.v5i4.544.

E. Irianti, D. F. Surianto, A. Z. Adistia, M. Juharman, and J. A. Safi’i, “Implementasi Kriptografi Vigenere Cipher untuk Keamanan Data Informasi Desa,” Progress. Information, Secur. Comput. Embed. Syst., vol. 1, no. 1, pp. 8–15, 2023, doi: https://doi.org/10.61255/pisces.v1i1.24.

S. A. Zebua, “Modifikasi Algoritma Vigenere Cipher dengan Pembangkit Kunci Random Number Generator Dalam Pengamanan Citra Digital,” J. Comput. Informatics Res., vol. 1, no. 3, pp. 71–81, 2022, doi: https://doi.org/10.47065/comforch.v1i3.345.

M. F. Siregar, A. H. Hasugian, and S. Suhardi, “Implementasi Kriptografi Kombinasi Algoritma Vigenere Cipher Dan Reverse Cipher Untuk Keamanan Teks Pada Aplikasi Catatan Pribadi Berbasis Android,” J. Sci. Soc. Res., vol. 7, no. 4, pp. 2121–2125, 2024, doi: https://doi.org/10.54314/jssr.v7i4.2359.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Penerapan Kriptografi untuk Pengamanan Data Nilai Siswa dengan Algoritma Super Enkripsi

Dimensions Badge

ARTICLE HISTORY

Published: 2025-02-28

Abstract View: 186 times
PDF Download: 141 times

How to Cite

Jefry G G Saragih. (2025). Penerapan Kriptografi untuk Pengamanan Data Nilai Siswa dengan Algoritma Super Enkripsi. ADA Journal of Information System Research, 2(2), 77-85. https://doi.org/10.64366/adajisr.v2i2.78