Super Encryption of the Hill Cipher Method and the AES Method for Security of Employee Salary Data

  • Ervina Br Sitepu STMIK Kaputama, Binjai, Sumatera Utara
  • Achmad Fauzi STMIK Kaputama, Binjai, Sumatera Utara
  • Rahmadani Rahmadani STMIK Kaputama, Binjai, Sumatera Utara

Abstract

Data security is a security system that is needed to protect data in systems, networks and other digital components. In a unit or agency such as the South Binjai sub-district office, the management of employee salary data is done digitally, namely via a computer. However, in this increasingly sophisticated digital era, it can cause many irresponsible individuals to easily wiretapping the company's data so that it can be easily accessed by other parties, as well as employee salary data which contains a lot of data. important. In order to avoid unwanted things such as theft of personal data by irresponsible persons, a security system is needed that can maintain the confidentiality of data and secure data. Therefore, in this case, a security system is needed that can maintain the confidentiality of data and secure employee salary data. With that there are many algorithms that can be used in securing employee salary data. And the algorithm used is hill cipher and AES algorithm. The hill cipher algorithm is an encryption-decryption algorithm that uses a transformation matrix. The AES algorithm is a symmetric block ciphertext that can encrypt and decrypt information. The use of these two algorithms can further strengthen the security of employee salary data. From the results of the trials carried out, the sample data used containing employee salary data was successfully secured with both hill cipher and AES algorithms.

References

[1] Computer Networking Book - Google Search (p. 228). (2018). DEEPUBLISH.
[2] Munir's book.pdf (p. 644). (2019). Bandung Informatics.
[3] Fadlullah, F., Tahir, M., Bintari, BP, Dewi, ML, Ilmy, MF, Ardiansyah, R., Informatics, PP, Madura, UT, & Telang, JR (2023). Implementation of AES Algorithm in Information System Login Authentication. 1(2).
[4] Gusti, O., Aritonang, A., Anwar, B., Kom, S., Kom, M., & Taufik, F. (2019). "Implementation of Cryptography Using the HILL CIPHER Method for Data Security of Cashier Employee Salaries at PT. Matahari Department Store Plaza Medan Fair ”. 30, 1–15.
[5] Hasibuan, YW, Veronica, RB, Mathematics, J., Semarang, UN, Gunungpati, KS, & Article, I. (2022). How to Cite. 11(1), 54–68.
[6] Hidayat, A., & Alawiyah, T. (2013). Text Encryption and Decryption using Hill Cipher Algorithm with Rectangle Matrix Key. 9(1), 39–51.
[7] Cryptography Cryptography & Confidentiality, K. (2006). Chapter 2 theoretical basis.
[8] Kromodimoeljo, S. (2009). Cryptographic Theory and Applications. In Zeitschrift fur die Gesamte Hygiene und Ihre Grenzgebiete (Vol. 30, Issue 6).
[9] Problem, R. (n.d.). Implementation of Cryptography Using the Advanced Encryption Standard (AES) Algorithm with the CBC (Chipher Block Chaining) Method and Checking for Error Detection.
[10] Munir, R. (2004). Advanced Encryption Standard (AES) Department of Informatics Engineering , Bandung Institute of Technology 13. Advanced Encryption Standard (AES).
[11] Muhammad Fadlan, Haryansyah, & Rosmini. (2021). Data Security through the Autokey Cipher Super Encryption Model and Column Transposition. Journal of RESTI (System Engineering and Information Technology), 5(6), 1113–1119.
[12] Sitorus, NT (2021). Payroll Data Security for Naori Tigadolok Office Employees Using Einsten Encryption. Journal of Informatics Dialectics (Detika), 2(1), 1–6.
[13] Standard, AE, Aes, A., Aes, A., Standard, AE, Standard, DE, Des, T., Feistel, K., Aes, S., Network, SP, & Spn, K. (2001). AES Algorithm Encryption (Advanced Encryption Standard).
[14] Studies, P., Informatics, T., & Sukabumi, UM (2018). Study of Advanced Encryption Standard ( AES ).
[15] Wastito, GH (2018). Chapter II Basic Theory. Journal of Chemical Information and Modeling, 53(9), 1689–1699.
[16] Zacky. (2016). AES Algorithm Encryption (Advanced Encryption Standard) - Cryptography & Computer Networks.
Published
2024-01-23
How to Cite
SITEPU, Ervina Br; FAUZI, Achmad; RAHMADANI, Rahmadani. Super Encryption of the Hill Cipher Method and the AES Method for Security of Employee Salary Data. International Journal of Informatics, Economics, Management and Science (IJIEMS), [S.l.], v. 3, n. 1, p. 29-37, jan. 2024. ISSN 2809-8471. Available at: <http://journal.stmikjayakarta.ac.id/index.php/ijiems/article/view/1219>. Date accessed: 14 apr. 2024. doi: https://doi.org/10.52362/ijiems.v3i1.1219.

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.