Published: 2024-01-01
Pengamanan Basis Data Kasus Kekerasan pada Perempuan dan Anak Menggunakan Algoritma Vigenere Cipher dan Base64
DOI: 10.35870/jtik.v8i1.1311
Fenny Fitria Oktaviany, Eka Ardhianto
- Fenny Fitria Oktaviany: Affiliation name not available , Universitas Stikubank Semarang , Indonesia
- Eka Ardhianto: Affiliation name not available , Universitas Stikubank Semarang , Indonesia
Article Metrics
- Views 0
- Downloads 0
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
Cases of violence against children and women that occur in Indonesia are still a serious problem that must be addressed immediately. The official website of the Ministry of Women's Empowerment and Child Protection shows that in the last 3 years these cases have increased significantly. One of the efforts that have been made is to form Integrated Service Centers that spread across various cities as a forum for complaints. The complaint data must be secured to prevent misuse by unauthorized parties. The purpose of this study is to secure these data using the Vigenere Cipher and Base64 algorithms and a combination of the two algorithms. The entropy value is used as a test performance metric for each algorithm. From this test, the level of information security obtained was 72.77% on data encrypted using a combination of the Base64 and Vigenere Cipher algorithms
Keywords
Base64 ; Cryptography ; Encryption ; Vigenere
Article Metadata
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page to understand its reach and credibility.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.
How to Cite
Article Information
This article has been peer-reviewed and published in the Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 8 No. 1 (2024)
-
Section: Computer & Communication Science
-
Published: %750 %e, %2024
-
License: CC BY 4.0
-
Copyright: © 2024 Authors
-
DOI: 10.35870/jtik.v8i1.1311
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem. By leveraging artificial intelligence for indexing, recommendation, and citation analysis, we enhance the visibility and impact of published research.
Fenny Fitria Oktaviany
Program Studi Teknik Informatika, Fakultas Teknologi Informasi dan Industri, Universitas Stikubank Semarang, Kota Semarang, Provinsi Jawa Tengah, Indonesia
-
Ahamed, B.B. and Krishnamoorthy, M., 2020. SMS encryption and decryption using modified vigenere cipher algorithm. Journal of the Operations Research Society of China, pp.1-14. DOI: https://doi.org/10.1007/s40305-020-00320-x.
-
-
Ardhianto, E., Handoko, W.T., Supriyanto, E. and Murti, H., 2021. Evolusi Cipher Vigenere dalam Peningkatan Pengamanan Informasi. Jurnal Informatika UPGRIS, 7(2), pp. 23-27. DOI: https://doi.org/10.26877/jiu.v7i2.9333.
-
-
Rifaâ, A. and Sumartini, L.C., 2019. Implementasi Kriptografi Menggunakan Metode Blowfish Dan Base64 Untuk Mengamankan Database Informasi Akademik Pada Kampus Akademi Telekomunikasi Bogor Berbasis Web-Based. Jurnal E-Komtek, 3(2), pp.87-96. DOI: https://doi.org/10.37339/e-komtek.v3i2.133.
-
-
-
Cahyono, T., Setianingsih, S. and Iskandar, D., 2022. Implementation Of The Waterfall Method In The Design Of A Website-Based Book Lending System. Jurnal Teknik Informatika (Jutif), 3(3), pp.723-730. DOI: https://doi.org/10.20884/1.jutif.2022.3.3.285
-
Irsandi, J.S., Fitri, I., Nathasia, N.D. and Kunci, K., 2020. Sistem Informasi Pemasaran dengan Penerapan CRM (Customer Relationship Management) Berbasis Website menggunakan Metode Waterfall dan Agile. J. JTIK (Jurnal Teknol. Inf. dan Komunikasi), 5(4), p.346. DOI: https://doi.org/10.35870/jtik.v5i4.192.
-
Supriyanto, E., Handoko, W.T., Wibowo, S.A. and Ardhianto, E., 2022. Peningkatan Ketahanan Algoritma Vigenere menggunakan Generator kunci Tiga Lapis. JURNAL MAHAJANA INFORMASI, 7(1), pp.24-33. DOI: https://doi.org/10.51544/jurnalmi.v7i1.2894.
-
Aulia, R., Zakir, A. and Purwanto, D.A., 2018. Penerapan Kombinasi Algoritma Base64 Dan Rot47 Untuk Enkripsi Database Pasien Rumah Sakit Jiwa Prof. Dr. Muhammad Ildrem. InfoTekJar: Jurnal Nasional Informatika dan Teknologi Jaringan, 2(2), pp.146-151. DOI: https://doi.org/10.30743/infotekjar.v2i2.300.
-
-
Milian, Y.C. and Sulistyo, W., 2023. Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher. Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi), 7(2), pp.208-216. DOI: https://doi.org/10.35870/jtik.v7i2.716.
-
Junikhah, A., 2022. Implementasi Vigenere Cipher Pada Aplikasi Myprichat End-To-End Encrypted Sms Berbasis Android. JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), 7(3), pp.680-691. DOI: https://doi.org/10.29100/jipi.v7i3.3012.
-

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
Authors retain copyright of their work and grant the journal non-exclusive right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.