Implementasi Sistem Keamanan Data Menggunakan Algoritma Kriptografi Asimetris Elliptic Curve Cryptography (ECC) Berbasis Website

Authors

  • Putri Iqlima Universitas Malikussaleh, Indonesia Author
  • Muhammad Rayyan Universitas Malikussaleh, Indonesia Author
  • Az Zahra Alfansuri Rambe Universitas Malikussaleh, Indonesia Author
  • Elin Ardina Universitas Malikussaleh, Indonesia Author
  • Delia Fitri Anggriani Lubis Universitas Malikussaleh, Indonesia Author
  • Dea Ismawati Universitas Malikussaleh, Indonesia Author

DOI:

https://doi.org/10.62671/jikum.v1i1.37

Keywords:

Data security, Cryptography, Elliptic Curve Cryptography (ECC)

Abstract

Data security is very important in the digital world, especially to protect personal data, financial transactions, and sensitive communications. One method used to maintain information security is cryptography, specifically Elliptic Curve Cryptography (ECC). ECC offers a level of security equivalent to other algorithms such as RSA, but with a smaller key size, making it more efficient in resource usage. This web-based system allows users to encrypt and decrypt messages using public and private keys. Although effective in maintaining data security, this system still requires manual input of keys by the user, which is prone to errors. Further development is needed to improve key management and user convenience. 

References

Alfatah, D., Asimetris, K., & Data, K. (n.d.). Use Of Asymmetric Cryptography In Securing IOT Communication. 3(1), 19–24.

Azlin, Musadat, F., & Nur, J. (2018). Aplikasi Kriptografi Keamanan Data Menggunakan Algoritma Base64. Jurnal Informatika, 7(2), 1–5.

Husaini, F., Pardede, A. M. H., & Gultom, I. (2022). Penerapan Enkripsi Menggunakan Metode Elgamal guna Meningkatkan Keamanan Data Text dan Gambar. JUKI : Jurnal Komputer Dan Informatika, 4(1), 67–73.

Indriyani, T., Dinasti Airlangga, P., Jaka, F., Adhi, I. T., & Surabaya, T. (2023). Enkripsi Data Dengan Mengunakan Metode ECC (Elliptic Curve Cryptography). Seminar Nasional Sains Dan Teknologi Terapan, XI, 1–9. https://ejurnal.itats.ac.id/sntekpan/article/view/5225/0

Nugroho, Y., & Painem, P. (2022). Implementasi Algoritma Elliptic Curve Cryptography (ECC) Untuk Pengamanan File Berbasis Web. Prosiding Seminar Nasional …, September, 258–267. http://senafti.budiluhur.ac.id/index.php/senafti/article/view/215

Perdana, D., Purwiko, P., Dewanta, F., & Afianti, F. (2022). Analisa Penggunaan Elliptic Curve Cryptography pada Sistem Autentikasi pada Internet of Things. 8(1), 42–49.

Taopan, G. I., Boru, M., & Fanggidae, A. (2022). Pengamanan Portable Document Format (PDF) Menggunakan Algoritma Kriptografi Kurva Eliptik. Jurnal Komputer Dan Informatika, 10(1), 47–54. https://doi.org/10.35508/jicon.v10i1.5296

Downloads

Published

2025-05-03

How to Cite

Iqlima, P., Rayyan, M. ., Rambe, A. Z. A. ., Ardina, E. ., Lubis, D. F. A. ., & Ismawati, D. . (2025). Implementasi Sistem Keamanan Data Menggunakan Algoritma Kriptografi Asimetris Elliptic Curve Cryptography (ECC) Berbasis Website. JIKUM: Jurnal Ilmu Komputer, 1(1), 7-11. https://doi.org/10.62671/jikum.v1i1.37

How to Cite

Iqlima, P., Rayyan, M. ., Rambe, A. Z. A. ., Ardina, E. ., Lubis, D. F. A. ., & Ismawati, D. . (2025). Implementasi Sistem Keamanan Data Menggunakan Algoritma Kriptografi Asimetris Elliptic Curve Cryptography (ECC) Berbasis Website. JIKUM: Jurnal Ilmu Komputer, 1(1), 7-11. https://doi.org/10.62671/jikum.v1i1.37