Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of International Conference Proceedings

A Modified Hill Cipher For Better Security Johni S Pasaribu
Journal of International Conference Proceedings (JICP) Vol 1, No 2 (2018): Proceedings of the 2nd International Conference of Project Management (ICPM) Gor
Publisher : AIBPM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (506.912 KB) | DOI: 10.32535/jicp.v1i2.284

Abstract

Security is the most challenging aspects in the internet and network application. These days the applications like Internet and networks are growing very fast, thereby the importance and the value of the exchanged data over the internet or other media types are increasing. While transmitting any confidential information across network, some unauthorized user tend to steal or corrupt the data. To prevent this interruption, security of data is needed. As data security is needed for protecting data from unauthorized users and destructive forces, some security techniques are used. Encryption is one such technique which is used to protect the database from unauthorized accesses and unwanted actions of external clients. It is used to secure the confidential information from unauthorized user by converting the data in to that format that is only understandable by the authorized receiver that knows the respective decryption to obtain the original data or information. In this paper, our focus will be on Database Security, as databases are considered as the storehouses of data. Generally, data of an organization or a company is stored in databases and is very crucial to the organization. Today, most of the organizations allow their clients to use their services (online banking, online shopping etc) by accessing their databases. This leads to a requirement of high level security to deal with information attackers. An information attacker tries to illegally acquire or modify the highly confidential data of the organization. An innovative approach for database security using Hill Cipher encryption & decryption method is proposed. This cryptography based approach provides an additional level of security to the database systems. Important data or information crucial to the organization should be secured from illegal theft and attacks. This encryption scheme completely is based on key matrix that a organization decides before encryption and decryption. In this proposed scheme a common key is used to encrypt the data items. Keywords: Database, Data security, Encryption, Decryption, Hill Chiper Algorithm.
DESIGN OF INFORMATION SYSTEM ARCHIVING INCOME AND OUTGOING MAIL BASED ON THE WEB AT DISKOMINFO KABUPATEN BANDUNG Johni S Pasaribu
Journal of International Conference Proceedings (JICP) Vol 2, No 1 (2019): Proceedings of the 3rd International Conference of Project Management (ICPM) Bal
Publisher : AIBPM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32535/jicp.v2i1.447

Abstract

The archive is a recording of activities that must be managed properly and carefully. Management archive of incoming letters or outgoing letter at the Bandung District Diskominfo still managed manually, by collecting files relating to all activities at the Bandung District Diskominfo in one place and stored in a storage closet. Management of this kind causes the lack of rigor according to the classification and archiving based on the type and importance, consequently officer had difficulty in finding the necessary documents. One of the other problems that arise is the specially for incoming letters which must include a disposition sheet from the Head of Service, so if at any time the Head of Service is not in place, it will hamper the follow-up. And when making a report in the manual system, it must record the report of the incoming and outgoing mail. It required an information system archiving of incoming mails or outgoing mails web-based that can facilitate the work of. This information system is designed using the programming language PHP and uses an object-based modeling techniques to describe the analysis and design of the system. The results of this software can be used in the Bandung District Diskominfo environment so that the new system can make it easier to search, faster and secure file archives stored. The Service Head can be when not in place, further instructions for incoming mail are not hampered. Making Reports easier without having to re-record the data of incoming and outgoing mail.