Penerapan Kriptografi untuk Pengamanan Data Nilai Siswa dengan Algoritma Super Enkripsi
DOI:
https://doi.org/10.64366/adajisr.v2i2.78Keywords:
Cryptography; Vigenere; Column Trasposition; Encryption; Message Security; Super EncryptionAbstract
This study discusses the application of cryptography using the super-encryption method as a solution for securing student grade data at SMA Negeri 5 Medan, which still relies on manual systems and is therefore vulnerable to manipulation and data leakage. Super-encryption was chosen because it combines two cipher techniques to strengthen security, with the Vigenere Cipher algorithm employed as one of the methods for both encryption and decryption processes. The research stages include literature review, system requirements analysis, architecture and algorithm design, application implementation, testing, and result documentation. The encryption process successfully transformed the plaintext of student grades into ciphertext that is difficult for unauthorized parties to interpret, while the decryption process accurately restored the ciphertext to its original form using the same key. The testing results indicate that this method ensures the confidentiality and integrity of academic data while enhancing the security of multi-user information systems. Thus, this research emphasizes that implementing super-encryption in student grade management systems not only protects privacy and data authenticity but also serves as a strategic solution to address cybersecurity threats in the field of education.
Downloads
References
S. Chandra, S. Bhattacharyya, S. Paira, and S. Alam, “A study and analysis on symmetric cryptography,” in 2014 International Conference on Science Engineering and Management Research (ICSEMR), 2014, pp. 1–8. doi: 10.1109/ICSEMR.2014.7043664.
J. Kapoor and D. Thakur, “Analysis of symmetric and asymmetric key algorithms,” in ICT analysis and applications, Springer, 2022, pp. 133–143. doi: https://doi.org/10.1007/978-981-16-5655-2_13.
V. Rudnytskyi, O. Korchenko, N. Lada, R. Ziubina, L. Wieclaw, and L. Hamera, “Cryptographic encoding in modern symmetric and asymmetric encryption,” Procedia Comput. Sci., vol. 207, pp. 54–63, 2022, doi: https://doi.org/10.1016/j.procs.2022.09.037.
F. D. Yonathan, H. Nasution, and H. Priyanto, “Aplikasi Pengaman Dokumen Digital Menggunakan Algoritma Kriptografi Hybrid dan Algoritma Kompresi Huffman,” JEPIN (Jurnal Edukasi dan Penelit. Inform., vol. 7, no. 2, pp. 181–195, 2021, doi: https://doi.org/10.26418/jp.v7i2.47077.
H. Putri, L. Virna, T. Febrianti, and T. Sutabri, “Pengamanan Data Transmisi Aplikasi Web Menggunakan Algoritma Kriptografi RSA: Studi Kasus dan Analisis,” J. Manaj. Inform. Teknol., vol. 5, no. 1, pp. 153–170, 2025, doi: https://doi.org/10.51903/rdbsne23.
Z. Arif and A. Nurokhman, “Analisis Perbandingan Algoritma Kriptografi Simetris Dan Asimetris Dalam Meningkatkan Keamanan Sistem Informasi,” J. Teknol. Sist. Inf., vol. 4, no. 2, pp. 394–405, 2023, doi: https://doi.org/10.35957/jtsi.v4i2.6077.
S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, “Security of internet of things based on cryptographic algorithms: a survey,” Wirel. Networks, vol. 27, no. 2, pp. 1515–1555, 2021, doi: https://doi.org/10.1007/s11276-020-02535-5.
N. Febitri, H. Witriyono, M. Muntahanah, and M. Marhalim, “Application of AES 256 Cryptography Algorithm OCB Mode on Student Data,” J. Komputer, Inf. dan Teknol., vol. 3, no. 2, pp. 423–432, 2023, doi: https://doi.org/10.53697/jkomitek.v3i2.1478.
L. Judijanto, P. D. Persadha, I. Susilowati, H. K. Reza, and M. Susanti, “Analisis Keamanan Data dan Perlindungan Privasi dalam Pengelolaan Big Data: Tinjauan Teknologi Enkripsi dan Anonimisasi,” J. Penelit. Inov., vol. 5, no. 2, pp. 991–1000, 2025, doi: https://doi.org/10.54082/jupin.1151.
C. Ko?cielny, M. Kurkowski, and M. Srebrny, “Foundations of symmetric cryptography,” in Modern Cryptography Primer: Theoretical Foundations and Practical Applications, Springer, 2013, pp. 77–118. doi: https://doi.org/10.1007/978-3-642-41386-5_3.
B. Mandal, S. Chandra, S. S. Alam, and S. S. Patra, “A comparative and analytical study on symmetric key cryptography,” in 2014 international conference on electronics, communication and computational engineering (ICECCE), IEEE, 2014, pp. 131–136. doi: 10.1109/ICECCE.2014.7086646.
R. A. Manurung, S. Sutarman, and S. Efendi, “Comparative Analysis of the Performance of Four Symmetric Algorithms on Digital File Security,” J. INFORMATICS Telecommun. Eng., vol. 8, no. 2, pp. 152–164, 2025, doi: 10.31289/jite.v8i2.13978.
V. Kapoor and R. Gupta, “Hybrid symmetric cryptography approach for secure communication in web application,” J. Discret. Math. Sci. Cryptogr., vol. 24, no. 5, pp. 1179–1187, 2021, doi: https://doi.org/10.1080/09720529.2021.1936900.
S. E. Noor, A. Ahmad, M. V. Martos Núñez, and M. J. Hornos Barranco, “Learning the basics of cryptography with practical examples,” REIDOCREA, vol. 11, no. 24, pp. 274–281, 2022, doi: http://dx.doi.org/10.30827/Digibug.74740.
A. Abuzaid, X. Yuan, H. Yu, and B. Chu, “The Design and Implementation of a Cryptographic Education Tool.,” in 3rd International Conference on Computer Supported Education, 2011, pp. 193–198. doi: 10.5220/0003301301930198.
P. . Chakravarthy and T. Anjikumar, “A Novel Symmetric Key Cryptography using Multiple Random Secret Keys,” Int. J. Comput. Appl., vol. 80, no. 16, pp. 27–32, 2013, doi: 10.5120/13954-1890.
M. B. Yassein, S. Aljawarneh, E. Qawasmeh, W. Mardini, and Y. Khamayseh, “Comprehensive study of symmetric key and asymmetric key encryption algorithms,” in 2017 international conference on engineering and technology (ICET), IEEE, 2017, pp. 1–7. doi: 10.1109/ICEngTechnol.2017.8308215.
A. S. Ellapalli and S. Varadarajan, “Information security with cryptography symmetric key encryption algorithms: a survey,” I-Manager’s J. Commun. Eng. Syst., vol. 11, no. 1, p. 19, 2022, doi: 10.26634/jcs.11.1.18913.
D. A. Meko, “Perbandingan Algoritma DES, AES, IDEA Dan Blowfish dalam Enkripsi dan Dekripsi Data,” J. Teknol. Terpadu, vol. 4, no. 1, pp. 8–15, 2018, doi: https://doi.org/10.54914/jtt.v4i1.110.
M. Abudalou, “Enhancing Data Security through Advanced Cryptographic Techniques,” Int. J. Comput. Sci. Mob. Comput., vol. 13, no. 1, pp. 88–92, 2024, doi: https://doi.org/10.47760/ijcsmc.2024.v13i01.007.
S. Naeem, “Network security and cryptography challenges and trends on recent technologies,” J. Appl. Emerg. Sci., vol. 13, no. 1, pp. 1–8, 2023, doi: http://dx.doi.org/10.36785/jaes.131546.
R. Hazra, P. Chatterjee, Y. Singh, G. Podder, and T. Das, “Data encryption and secure communication protocols,” in Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning, IGI Global, 2024, pp. 546–570. doi: 10.4018/979-8-3693-6557-1.ch022.
R. Banoth and R. Regar, “Asymmetric Key Cryptography,” in Classical and Modern Cryptography for Beginners, Springer, 2023, pp. 109–165. doi: https://doi.org/10.1007/978-3-031-32959-3_4.
M. S. Al-Batah, M. S. Alzboon, M. Alzyoud, and N. Al-Shanableh, “Enhancing image cryptography performance with block left rotation operations,” Appl. Comput. Intell. Soft Comput., vol. 2024, no. 1, pp. 1–19, 2024, doi: https://doi.org/10.1155/2024/3641927.
C. Ubochi, B. Olaniyi, K. Ukagwu, and S. Nnamchi, “A comparative analysis of symmetric cryptographic algorithm as a data security tool: A survey,” NIPES-Journal Sci. Technol. Res., vol. 5, no. 3, pp. 144–168, 2023, doi: https://doi.org/10.5281/zenodo.8313097.
A. Yeboah-Ofori, C. K. Agbodza, F. A. Opoku-Boateng, I. Darvishi, and F. Sbai, “Applied cryptography in network systems security for cyberattack prevention,” in 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), IEEE, 2021, pp. 43–48.
S. Windarta, S. Suryadi, K. Ramli, B. Pranggono, and T. S. Gunawan, “Lightweight cryptographic hash functions: Design trends, comparative study, and future directions,” Ieee Access, vol. 10, pp. 82272–82294, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3195572.
S. M. S. Eldin et al., “Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences,” IEEE Access, vol. 11, pp. 101694–101709, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3298545.
S. Bahri, F. Jihan, and B. Rudianto, “Implementasi Algoritma Super Enkripsi Vigenere Cipher Dan Route Cipher Pada Penyandian Pesan Teks,” J. Mat. UNAND, vol. 12, no. 2, pp. 168–175, 2023, doi: https://doi.org/10.25077/jmua.12.2.168-175.2023.
A. M. Supriyatno and E. Ardhianto, “Peningkatan Keamanan Pesan Teks Menggunakan Super Enkripsi Algoritma Caesar Cipher Standard Dan Vigenere Autokey,” J. Ilm. KOMPUTASI, vol. 23, no. 2, pp. 167–172, 2024, doi: https://doi.org/10.32409/jikstik.23.2.3602.
N. B. Putra, B. C. Andika, A. D. Purba, and M. Ridwan, “Implementasi Sandi Vigenere Cipher dalam Mengenkripsikan Pesan,” JOCITIS-Journal Sci. Infomatica Robot., vol. 1, no. 1, pp. 42–50, 2023, doi: https://jurnal.ittc.web.id/index.php/jct/article/view/25.
I. Riadi, A. Fadlil, and F. A. Tsani, “Pengamanan citra digital berbasis kriptografi menggunakan algoritma Vigenere Cipher,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 7, no. 1, pp. 33–45, 2022, doi: https://doi.org/10.14421/jiska.2022.7.1.33-45.
A. H. Hasugian, “Implementasi Algoritma Vigenere Cipher Untuk Keamanan Data Bantuan Sosial Di Desa,” Bull. Comput. Sci. Res., vol. 5, no. 4, pp. 317–328, 2025, doi: https://doi.org/10.47065/bulletincsr.v5i4.544.
E. Irianti, D. F. Surianto, A. Z. Adistia, M. Juharman, and J. A. Safi’i, “Implementasi Kriptografi Vigenere Cipher untuk Keamanan Data Informasi Desa,” Progress. Information, Secur. Comput. Embed. Syst., vol. 1, no. 1, pp. 8–15, 2023, doi: https://doi.org/10.61255/pisces.v1i1.24.
S. A. Zebua, “Modifikasi Algoritma Vigenere Cipher dengan Pembangkit Kunci Random Number Generator Dalam Pengamanan Citra Digital,” J. Comput. Informatics Res., vol. 1, no. 3, pp. 71–81, 2022, doi: https://doi.org/10.47065/comforch.v1i3.345.
M. F. Siregar, A. H. Hasugian, and S. Suhardi, “Implementasi Kriptografi Kombinasi Algoritma Vigenere Cipher Dan Reverse Cipher Untuk Keamanan Teks Pada Aplikasi Catatan Pribadi Berbasis Android,” J. Sci. Soc. Res., vol. 7, no. 4, pp. 2121–2125, 2024, doi: https://doi.org/10.54314/jssr.v7i4.2359.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Penerapan Kriptografi untuk Pengamanan Data Nilai Siswa dengan Algoritma Super Enkripsi
ARTICLE HISTORY
How to Cite
Issue
Section
Copyright (c) 2025 Jefry G G Saragih

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






