Muhammad Fadhillah Akbar, . (2024) ANALISIS PERBANDINGAN HASIL ENKRIPSI RSA DAN TWOFISH DALAM KONTEKS ENKRIPSI BACKUP DATABASE DENGAN PENGGUNAAN METODE KOMPRESI DEFLATE. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.
Text
ABSTRAK.pdf Download (10kB) |
|
Text
AWAL.pdf Download (414kB) |
|
Text
BAB I.pdf Restricted to Repository UPNVJ Only Download (25kB) |
|
Text
BAB II.pdf Restricted to Repository UPNVJ Only Download (272kB) |
|
Text
BAB III.pdf Restricted to Repository UPNVJ Only Download (116kB) |
|
Text
BAB IV.pdf Restricted to Repository UPNVJ Only Download (1MB) |
|
Text
BAB V.pdf Download (16kB) |
|
Text
DAFTAR PUSTAKA.pdf Download (133kB) |
|
Text
DAFTAR RIWAYAT HIDUP.pdf Restricted to Repository UPNVJ Only Download (86kB) |
|
Text
LAMPIRAN.pdf Restricted to Repository UPNVJ Only Download (5MB) |
|
Text
HASIL PLAGIARISME.pdf Restricted to Repository staff only Download (277kB) |
|
Text
ARTIKEL KI.pdf Restricted to Repository staff only Download (539kB) |
Abstract
In the rapidly evolving digital era, data protection has become crucial. Data stored in backup databases often includes highly sensitive and critical information, necessitating robust encryption methods to ensure confidentiality and integrity. This research aims to analyze and compare the performance of two encryption algorithms, namely RSA and Twofish, in the context of Backup Database encryption using the Deflate compression method. RSA is an asymmetric encryption algorithm known for its high level of security, while Twofish is a symmetric encryption algorithm efficient in terms of computational time and memory usage. This study reveals the advantages and disadvantages of each algorithm in specific applications, as well as how the Deflate compression method affects the efficiency of encryption and decryption. The results show that RSA, despite its high security, requires longer processing times compared to Twofish. Conversely, Twofish offers faster computation times and more efficient memory usage but has vulnerabilities related to the keys used. The combination of both algorithms with the Deflate compression method is not very efficient in enhancing storage efficiency and data transfer in Backup Database systems.
Item Type: | Thesis (Skripsi) |
---|---|
Additional Information: | [No.Panggil: 2010511005] [Pembimbing: Bayu Hananto] [Penguji 1: Jayanta] [Penguji 2: Ika Nurlaili Isnainiyah] |
Uncontrolled Keywords: | Cryptography, Encryption, Compression, Backup Database, RSA, Twofish, Deflate |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Fakultas Ilmu Komputer > Program Studi Informatika (S1) |
Depositing User: | MUHAMMAD FADHILLAH AKBAR |
Date Deposited: | 17 Sep 2024 03:00 |
Last Modified: | 17 Sep 2024 03:00 |
URI: | http://repository.upnvj.ac.id/id/eprint/31658 |
Actions (login required)
View Item |