Security of Employee Salary Data Using the ElGamal Algorithm By Utilizing the Diffie-Hellman Algorithm Key Generator
Abstract
Data security is something that is very important for companies or organizations, one of which is the South Binjai District Office. Almost all work in the South Binjai sub-district office uses a computer, especially in processing data stored in the form of data files on storage media without encoding. In today's digital era, many irresponsible parties find it easy to tap company data so that it can be easily accessed and there is also some software that can be easily used to crack passwords. One of the data that needs to be kept confidential is employee salary data. To overcome these problems, a security system is needed to secure text data. The cryptographic method is regarding encryption techniques in which plaintext is scrambled using an encryption key to become ciphertext which is applied in data security systems. The Diffie-Hellman algorithm is a key exchange algorithm, this algorithm is limited to the key exchange process, so it must require another algorithm for the encryption and decryption process such as the ElGamal algorithm. The use of these two algorithms can strengthen the level of data security. From the results of trials conducted, the sample data used containing the word "KARYAWAN" was successfully secured with both diffie-helman and ElGamal algorithms.
References
[2] Alfiah, F., Sudarji, R., & Al Fatah, DT (2020). Cryptographic Application Using Elgamal Algorithm Based on Java Desktop at Pt. Wahana Indo Trada Nissan Jatake. ADI Digital Business Interdisciplinary Journal, 1(1), 22–34.
[3] Erick, K. (2011). Quickly Proficient in Visual Basic 2010. CV Andi Offset.
[4] Ihsanudin, A., & Solichin, A. (2018). SKANIKA VOLUME 1 NO. MARCH 1 2018 60 Application of the DES Algorithm, Vernam Cipher and Diffie-Hellman to Secure New Student Registration Data on. 1(1), 60–67.
[5] Indahwati, N., & Prihanto, A. (2020). Application of Elgamal Asymmetric Cryptographic Algorithm with Key Generation Modification to Color Image Encryption and Decryption. Journal of Informatics and Computer Science (JINACS), 1(02), 97–103.
[6] Munir, R. (2019). CRYPTOGRAPHY (SECOND EDition). Bandung Informatics.
[7] Nisa, L., Indriyani, T., & Ruswiansari, M. (2020). Image and Text Encryption Applications Using Diffie-Hellman and ElGamal Algorithms. Journal of Technology and Management, 1(1), 8–17.
[8] Rizka, M. (2021). The combination of Diffie Hellman and Blowfish as a Document Security System. Infomedia Journal, 6(2), 86.
[9] Setiawan, R. (n.d.). Flowcharts Are: Functions, Types, Symbols, and Examples. August 4, 2021.
[10] Singh, R., & Kumar, S. (2012). Elgamal's Algorithm in Cryptography. International Journal of Scientific & Engineering Research, 3(12), 3–6.
[11] Yalisa, N., Arhami, M., & Azhar, A. (2018). Elgamal Algorithm with Diffie Hellman Key Exchange on Android-Based Fingerprint Image Security Applications. Proceedings of the National Seminar …, 2(1), 1–7.

This work is licensed under a Creative Commons Attribution 4.0 International License.