##plugins.themes.bootstrap3.article.main##

Risman Risman

Abstract

Database security is a very important aspect of an information system. A general information is onlyintended for certain groups. Therefore, it is very important for a company to prevent database leakage sothat the information contained in it does not fall to unauthorized people. Cryptographic technique is an alternative solution that can be used in database security. One way to maintain the security of the database is to use encryption techniques. The method used to secure the database is encryption using the ROTI3 and Caesar Cipher methods. Both of these methods have advantages in processing speed. For thisreason, the author will compare the use of the two algorithms above in terms of the encryption and decryption process time

##plugins.themes.bootstrap3.article.details##

How to Cite
Risman, R. (2021). Comparison of Performance Rot13 and Caesar Cipher Method for Registration Database of Vessels Berthed at P.T. Samudera Indonesia . International Journal of Basic and Applied Science, 10(3), 91–98. https://doi.org/10.35335/ijobas.v10i3.61
References
Abdul Kadir, 2003. Pengenalan Sistem Informasi. Andi. Yogyakarta Al-Bahra bin ladjamudin. (2005). Analisis dan Desain Sistem Informasi. Graha Ilmu: Yogyakarta.
Akbar, M. (2010). “Sistem Informasi Penjualan Motor Berbasis Web”. Jurusan Teknik Informatika UPN, 11–77.
Amril, S. (2013). Perancangan Sistem Informasi Penjualan Sepeda Motor Honda Berbasis Web Pada Dealer PT. Nusa Motor Ponorogo. Jurusan Teknik Informatika Universitas Muhammadiyah Ponorogo.Rahmel, D. (2008). Visual Basic.NET. New York: McGraw-Hill
AndriKristanto, 2003, Keamanan Data Pada Jaringan Komputer, Penerbit Gava Media, Yogyakarta.
Arief S, S. (2009). Media Pendidikan: Pengertian, pengembangan dan pemanfaatannnya. Raja Grafindo Persada.
Ariyanto, A. B. (2009). Simulasi Enkripsi dan Dekripsi Berbasis Algoritma Blowfish.
Ariyus, D. (2008). Pengantar Ilmu Kriptografi: Teori Analisis & Implementasi. Penerbit Andi. Arti kata simulasi Kamus Besar Bahasa Indonesia (KBBI) Online. (t.t.). Diambil 26 November 2018, dari https://kbbi.web.id/simulasi.
B. Nugroho. (2005). Database Relasional dengan MySQL. C.V Andi Offset: Yogyakarta. Fahmi, I. (2016). Teori dan Teknik Pengambilan Keputusan: Kualitatif dan Kuantitatif. Jakarta: Rajawali Pers.
Basheer, S., & Sreedhar, S. (2015). Crypto View: Visual Representation of Cryptographic Algorithms. 4(11).
Dian Rachmawati & Ade Candra. (2015). Implementasi Kombinasi Caesar dan Affine Cipher untuk Keamanan Data Teks. 1.
Ernie. (2009). Diagram Alir (Flowchart). 14 September 2009. https://ndoware.com/diagram-alir-flowchart.html
Kendall, K.E, dan J.E. Kendall, 2003, Analisis Perancangan Sistem, Edisi-5, Jilid I Penerbit P.T. Indeks, Jakarta.
Rahmat Lianda, 2008, Analisis dan Perbandingan Skema Digital Signature Spesial, Penerbit ITB, Bandung.
Schneiner, B., 2000, Applied Cryptography: Protocols, Algorithm, and Source Code in C, Penerbit Wiley, New York.
G. Kidanemariam and M. Uhlmann, “Interface-resolved direct numerical simulation of the erosion of a sediment bed sheared by laminar channel flow,” Int. J. Multiph. Flow, vol. 67, pp. 174–188, 2014.
M. Le, S. Cordier, C. Lucas, and O. Cerdan, “A faster numerical scheme for a coupled system modeling soil erosion and sediment transport,” Water Resour. Res., vol. 51, no. 2, pp. 987–1005, 2015.
C. Peng, Y. Teng, B. Hwang, Z. Guo, and L.-P. Wang, “Implementation issues and benchmarking of lattice Boltzmann method for moving rigid particle simulations in a viscous flow,” Comput. Math. with Appl., vol. 72, no. 2, pp. 349–374, 2016.
D. R. L. Vedoy and J. B. P. Soares, “Water‐soluble polymers for oil sands tailing treatment: Review,” Can. J. Chem. Eng., vol. 93, no. 5, pp. 888–904, 2015.
Ata, M. S., Liu, Y., & Zhitomirsky, I. (2014). A review of new methods of surface chemical modification, dispersion and electrophoretic deposition of metal oxide particles. Rsc Advances, 4(43), 22716-22732.
Nore, V. N. (2013). Perancangan sistem informasi penjualan dan pemesanan produk berbasis web. Pr
Krismiaji, 2005. Sistem Informasi Akutansi. UPP STIM YKPN Yogyakarta. Syafi’I, M. (2005). Aplikasi Database Dengan PHP 5 MySQL PostgreSQL Oracle. Yogyakarta: Andi.