Penambahan Register pada Form Login Aplikasi Master Data KBM dengan Metode Kriptografi AES
DOI:
https://doi.org/10.32493/informatika.v7i2.22060Keywords:
Registrer, Login Form, Master data, Cryptography, EncryptionAbstract
Incorrectly designed login forms can result in malicious credentials being exploited to gain unauthorized access. Designing the appearance of the form is enough to have a role so as not to make the user confused when faced with the login form page. In order to make it easier for users to access certain pages, the user must register first. Register also means the registration process (in the register) or system, with the display of the register on the login form, it will make it easier for users to register individually so that they can enter the application. Because previously the KBM master data login form application did not have a register, the author added a register form on the KBM master data application login form page, and needed to add another label that served as a link to the member registration menu that we had created. To do so, click the Standard tab > Labels (StdCtrls), then change the text on the Properties tab. B. "Click here to register on the registration form (Whida, 2018). After testing the login application and the added registration form, the test did not detect any errors and passed all tests. The results according to this test can be used as a reference to improve your application in sync using what is needed and to ensure that the application we develop works as expected. With the development of the KBM master data application, security needs to be implemented as well, such as the vehicle database in the KBM master data Not guaranteed and there is always a risk of misuse of the KBM Master Data. To mitigate this, Master Data can be protected by using Shuffle Technologies (Cryptography, Encryption). Cryptography is sensitive information and is intended to prevent the use of information transmitted over networks such as LANs and the Internet. Known and used by other people and unauthorized parties. Encryption is a method of encoding a message or information into unreadable text and is closely related to encryption, which is a method to protect a message from being read by third parties. In this study, the author uses the Advanced Encryption Standard (AES) algorithm to create a PHP source code encryption application. The AES algorithm was chosen to provide a high level of security. The development of this registration form uses the AES cryptography method, the results of the development of this registration form have been tested and run well.
References
Deny Adhar. (2019, Juli). Implementasi Algoritma DES (Data Encription Standard) Pada Enkripsi Dan Deskripsi Sms Berbasis Android. Jurnal Teknik Informatika Kaputama (JTIK), 3(2), 53-60. Retrieved Juni 2022
Endang Setyawati, C. E. (2021, Februari). Pengujian keamanan komputer kriptografi pada surat elektronik berbasis website dengan enkripsi metode MD5. Jurnal Manajemen Informatika Jayakarta, 1(1), 57-67. Retrieved Juni 2022
Erma Yanti Sartika, S. P. (2021, Desember). Sistem Informasi Aset Perusahaan Berupa Kendaraan Bermotor PT. Monopoli Raya Medan. Journal of Information Technology Research, 2(2), 192-196. Retrieved Juni 2022
Indra Suryanto, D. C. (2017). Pengembangan Aplikasi Chat Messenger Dengan Metode Advanced Encryption Standard (AES) Pada Smartphone. Jurnal Coding Sistem Komputer Untan, 05(2), 1-12. Retrieved Juni 2022
Jasman, D. A. (2017, September). Rancang Bangun Aplikasi Enkripsi Coding Berbasis PHP Program Menggunakan Algoritma AES. Celscitech-UMRI, 2, 49-61. Retrieved Juni 2022
Laila, M. (2020, Februari). Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer. JURIKOM (Jurnal Riset Komputer), 7(1), 148-155. Retrieved July 2022
Muammar, F. L. (2021). Implementasi White Box Testing Dengan Teknik Basis Path Pada Pengujian Form Login. Jurnal Siliwangi Seri Sains dan Teknologi, 7(2), 35-40. Retrieved Juni 2022
Rosmasari, R. A. (2018, Desember). Implementasi Metode Kriptografi International Data. JURTI, 2(2). Retrieved Juni 2022
Simargolang, M. Y. (2017, July). Implementasi Kriftografi RSA dengan PHP. Jurnal Teknologi Informasi, 1(1), 1-10. Retrieved Juni 2022
Whida, C. N. (2018). Form Login Dan Sign Up Berbasis Database Dengan Delphi 7. Section Class Content, 2(1), 1-22. Retrieved Juni 2022
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Jurnal Informatika Universitas Pamulang have CC-BY-NC or an equivalent license as the optimal license for the publication, distribution, use, and reuse of scholarly work.
In developing strategy and setting priorities, Jurnal Informatika Universitas Pamulang recognize that free access is better than priced access, libre access is better than free access, and libre under CC-BY-NC or the equivalent is better than libre under more restrictive open licenses. We should achieve what we can when we can. We should not delay achieving free in order to achieve libre, and we should not stop with free when we can achieve libre.
Jurnal Informatika Universitas Pamulang is licensed under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)
YOU ARE FREE TO:
- Share : copy and redistribute the material in any medium or format
- Adapt : remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms