Implementasi Sistem Keamanan Data Menggunakan Algoritma Kriptografi Asimetris Elliptic Curve Cryptography (ECC) Berbasis Website
DOI:
https://doi.org/10.62671/jikum.v1i1.37Keywords:
Data security, Cryptography, Elliptic Curve Cryptography (ECC)Abstract
Data security is very important in the digital world, especially to protect personal data, financial transactions, and sensitive communications. One method used to maintain information security is cryptography, specifically Elliptic Curve Cryptography (ECC). ECC offers a level of security equivalent to other algorithms such as RSA, but with a smaller key size, making it more efficient in resource usage. This web-based system allows users to encrypt and decrypt messages using public and private keys. Although effective in maintaining data security, this system still requires manual input of keys by the user, which is prone to errors. Further development is needed to improve key management and user convenience.
References
Alfatah, D., Asimetris, K., & Data, K. (n.d.). Use Of Asymmetric Cryptography In Securing IOT Communication. 3(1), 19–24.
Azlin, Musadat, F., & Nur, J. (2018). Aplikasi Kriptografi Keamanan Data Menggunakan Algoritma Base64. Jurnal Informatika, 7(2), 1–5.
Husaini, F., Pardede, A. M. H., & Gultom, I. (2022). Penerapan Enkripsi Menggunakan Metode Elgamal guna Meningkatkan Keamanan Data Text dan Gambar. JUKI : Jurnal Komputer Dan Informatika, 4(1), 67–73.
Indriyani, T., Dinasti Airlangga, P., Jaka, F., Adhi, I. T., & Surabaya, T. (2023). Enkripsi Data Dengan Mengunakan Metode ECC (Elliptic Curve Cryptography). Seminar Nasional Sains Dan Teknologi Terapan, XI, 1–9. https://ejurnal.itats.ac.id/sntekpan/article/view/5225/0
Nugroho, Y., & Painem, P. (2022). Implementasi Algoritma Elliptic Curve Cryptography (ECC) Untuk Pengamanan File Berbasis Web. Prosiding Seminar Nasional …, September, 258–267. http://senafti.budiluhur.ac.id/index.php/senafti/article/view/215
Perdana, D., Purwiko, P., Dewanta, F., & Afianti, F. (2022). Analisa Penggunaan Elliptic Curve Cryptography pada Sistem Autentikasi pada Internet of Things. 8(1), 42–49.
Taopan, G. I., Boru, M., & Fanggidae, A. (2022). Pengamanan Portable Document Format (PDF) Menggunakan Algoritma Kriptografi Kurva Eliptik. Jurnal Komputer Dan Informatika, 10(1), 47–54. https://doi.org/10.35508/jicon.v10i1.5296



