Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE)
Vol 3, No 2 (2022)

Cryptography Generator for Prevention SQL Injection Attack In Big Data

Martiano Martiano (Universitas Muhammadiyah Sumatera Utara)
Yoshida Sary (Universitas Muhammadiyah Sumatera Utara)



Article Info

Publish Date
03 Sep 2022

Abstract

Currently, especially in Indonesia, data leaks occur in domestic agencies and private e-commerce. From these problems, cryptographic researchers are needed to make the data difficult to read, this research forms cryptography through a substitution method which will determine the number of keys that have been used and generated back in the dictionary, in its implementation the researcher uses the Devops design method, this method uses 4 stages, namely 1. ) continues development, 2) continues testing, 3) continues integration, 4) continues development. The results obtained by the text can be encrypted and described perfectly and successfully as much as 15864 data, and consumes low resources

Copyrights © 2022






Journal Info

Abbrev

jcositte

Publisher

Subject

Computer Science & IT Control & Systems Engineering Decision Sciences, Operations Research & Management Electrical & Electronics Engineering

Description

ournal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE) is being published in the months of March and September. It is academic, online, open access (abstract), peer reviewed international journal. The aim of the journal is to: Disseminate original, ...