Penerapan Algoritma Rail Fence Least Untuk Enkripsi Database Pada Aplikasi Rekrutmen Karyawan Baru Pada PT. Mukti Mandiri Lestari Berbasis Web

Main Article Content

Bahrum Silaban
Yanti Tusman
Rizky Vita Losi

Abstract

Applying encryption to databases is a crucial step in maintaining data security, especially in applications that handle sensitive information such as the employee recruitment process. This research aims to implement the Rail Fence Least algorithm in database encryption in a web-based new employee recruitment application at PT. Mukti Mandiri Lestari. The Rail Fence Least algorithm was chosen because it has advantages in terms of speed and efficiency of data encryption and decryption. The implementation of this algorithm is expected to increase the security of prospective employee data from potential unauthorized access and misuse of information. Test results show that this algorithm is effective in securing data without significantly compromising application performance. Thus, implementing the Rail Fence Least algorithm is the right solution to improve database security in new employee recruitment applications at PT. Mukti Mandiri Lestari.

Downloads

Download data is not yet available.

Article Details

How to Cite
Silaban, B., Yanti Tusman, & Rizky Vita Losi. (2024). Penerapan Algoritma Rail Fence Least Untuk Enkripsi Database Pada Aplikasi Rekrutmen Karyawan Baru Pada PT. Mukti Mandiri Lestari Berbasis Web. JURNAL MAHAJANA INFORMASI, 9(1), 54–60. https://doi.org/10.51544/jurnalmi.v9i1.5087
Section
Artikel

References

M. Fadlan, E. Dianti Bintari, and A. Tasya, “Pengamanan Basis Data Dengan Algoritma Transposisi Rail Fence,” Simkom, vol. 8, no. 2, pp. 66–72, 2023, doi: 10.51717/simkom.v8i2.135.

T. Gulo and M. T. Rustam, “Implementasi Keamanan Data Dana Desa Denggan Metode Railfence Cipher Dan Beaufort Cipher ( Studi Kasus Kantor Desa Ataualuo ),” no. 1, 2024.

Rantouli and M. Ikhsan, “Maintain Files Confidential By Using Rail Fence Cipher And Rot13 Method,” Instal J. Komput., vol. 15, no. 1, pp. 151–169, 2023.

M. Fiqri, D. Rahmawati, T. Elektro, and U. T. Madura, “Rancang Bangun Sistem Token Rekening Air dengan Metode Hybrid ( Caesar Chiper and Rail Fence Chiper Transposition ) sebagai Security System Identitas Pin Token,” Journal.Fortei7.Org, pp. 376–381, 2015.

S. Sinurat and Maranatha Pasaribu, “Text Encoding Using Cipher Block Chaining Algorithm,” J. Info Sains Inform. dan Sains, vol. 11, no. 2, pp. 13–17, 2021, doi: 10.54209/infosains.v11i2.42.

S. D. Nasution, “Pengamanan Perintah Koneksi ke Database MySQL Menggunakan Algoritma Caesar Cipher dan Algoritma Stout Codes,” Bull. Inf. Technol., vol. 5, no. 1, pp. 9–16, 2024, doi: 10.47065/bit.v5i1.1149.

R. M. S. Awalsyah, P. S. Harahap, and Muhammad Dono, “Implementasi Caesar Cipher Dalam Mengenkripsikan Pesan Pada Serangan Man in the Middle Attack,” JurnalJOCOTIS -Journal Sci. Inform. Robot., vol. 1, no. 1, pp. 64–72, 2023.

M. Suwarni, J. Wahyudi, and K. Khairil, “Comparison of the DES Cryptographic Algorithm and the AES Algorithm in Securing Document Files,” J. Media Comput. Sci., vol. 2, no. 1, pp. 41–48, 2023, doi: 10.37676/jmcs.v2i1.3348.

B. Zuhri and N. H. Harani, “Aplikasi Rekrutmen Karyawan Menggunakan Artificial Neural Network dan Flask,” J. Sisfotenika, vol. 13, no. 2, pp. 125–138, 2023, [Online]. Available: http://www.sisfotenika.stmikpontianak.ac.id/index.php/ST/article/view/1367%0Ahttps://www.sisfotenika.stmikpontianak.ac.id/index.php/ST/article/download/1367/836

T. Andriani and H. D. Purnomo, “Perancangan Aplikasi Perekrutan Karyawan Berbasis Web Menggunakan Platform Pega,” Aiti, vol. 17, no. 2, pp. 72–85, 2020, doi: 10.24246/aiti.v17i2.72-85.

D. Kurnia, “Rekrutmen Karyawan Baru Berbasis Metode Analytical Hierarchy Process (Ahp),” J. Teknoif Tek. Inform. Inst. Teknol. Padang, vol. 9, no. 2, pp. 64–72, 2021, doi: 10.21063/jtif.2021.v9.2.64-72.

S. Lena and L. Sangita, “Aplikasi Rekruitmen Karyawan Berbasis Web Menggunakan Framework Laravel,” J. Teknol. Inf., 2018.

J. Maulani, “Rekrutmen Karyawan Cv. Annisa Menggunakan Aplikasi Test Pisikotes Dan Kepribadian Berbasis Delphi,” Technol. J. Ilm., vol. 7, no. 2, pp. 117–121, 2017, doi: 10.31602/tji.v7i2.625.

R. Desrianti and H. D. Wijaya, “Implementasi Algoritma Fuzzy C-Means Pada Aplikasi Seleksi Karyawan Digital Talent di PT Telekomunikasi Indonesia,” J. Media …, vol. 4, pp. 879–888, 2020, doi: 10.30865/mib.v4i4.2267.

N. A. Pratama and C. Hermawan, “Aplikasi Pembelajaran Tes Potensi Akademik Berbasis Android,” Jnteti, vol. 6, no. 1, pp. 1–6, 2016, [Online]. Available: http://jurnal.unda.ac.id/index.php/Jpdf/article/view/11/13

Ranti Eka Putri, M. Wasito, and Ayu Nadia Lestari, “Sosialisasi Pemanfaatan Media Sosial Sebagai Media Promosi Produk UMKM Desa Suka Damai,” JURPIKAT (Jurnal Pengabdi. Kpd. Masyarakat), vol. 4, no. 3, pp. 667–675, 2023, doi: 10.37339/jurpikat.v4i3.1550.

J. Hendrawan, I. D. Perwitasari, and M. Ramadhani, “Rancang Bangun Sistem Informasi UKM Panca Budi Berbasis Website,” INTECOMS J. Inf. Technol. Comput. Sci., vol. 3, no. 1, pp. 18–24, 2020, doi: 10.31539/intecoms.v3i1.1330.

V. Tasril, M. Zen, E. S. Fitriani, and A. D. Putra, “Desain Ui/Ux Prototipe Pembelajaran Berbasis Game Kosakata Bahasa Inggris Dengan Metode Hcd Ui/Ux Design of English Vocabulary Game-Based Learning Prototype Using the Hcd Method,” J. Inf. Technol. Comput. Sci., vol. 6, no. 1, pp. 1–8, 2023.

R. R. Putra, “Perancangan Sistem E-Voting Dalam Pemilihan Osis Pada Smk Yapim Taruna Marelan,” vol. 14, no. 2, pp. 23–31, 2021.

R. R. Putra, N. A. Putri, and C. Wadisman, “Village Fund Allocation Information System for Community Empowerment in Klambir Lima Kebun Village,” J. Appl. …, vol. 3, no. 2, pp. 98–104, 2022, [Online]. Available: https://journal.yrpipku.com/index.php/jaets/article/view/681%0Ahttps://journal.yrpipku.com/index.php/jaets/article/download/681/467

andhika putri Putra, Randi Rian & nadya, “Implementasi sistem informasi perpustakaan dalam meningkatkan pelayanan dan struktur perpustakaan pada smp swasta pab 9 1,” Jar. Sist. Inf. …, vol. 6, no. 1, pp. 83–88, 2022, [Online]. Available: http://ojsamik.amikmitragama.ac.id/index.php/js/article/view/136