ANALISIS PERBANDINGAN HASIL ENKRIPSI RSA DAN TWOFISH DALAM KONTEKS ENKRIPSI BACKUP DATABASE DENGAN PENGGUNAAN METODE KOMPRESI DEFLATE

Muhammad Fadhillah Akbar, . (2024) ANALISIS PERBANDINGAN HASIL ENKRIPSI RSA DAN TWOFISH DALAM KONTEKS ENKRIPSI BACKUP DATABASE DENGAN PENGGUNAAN METODE KOMPRESI DEFLATE. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.

[img] Text
ABSTRAK.pdf

Download (10kB)
[img] Text
AWAL.pdf

Download (414kB)
[img] Text
BAB I.pdf
Restricted to Repository UPNVJ Only

Download (25kB)
[img] Text
BAB II.pdf
Restricted to Repository UPNVJ Only

Download (272kB)
[img] Text
BAB III.pdf
Restricted to Repository UPNVJ Only

Download (116kB)
[img] Text
BAB IV.pdf
Restricted to Repository UPNVJ Only

Download (1MB)
[img] Text
BAB V.pdf

Download (16kB)
[img] Text
DAFTAR PUSTAKA.pdf

Download (133kB)
[img] Text
DAFTAR RIWAYAT HIDUP.pdf
Restricted to Repository UPNVJ Only

Download (86kB)
[img] Text
LAMPIRAN.pdf
Restricted to Repository UPNVJ Only

Download (5MB)
[img] Text
HASIL PLAGIARISME.pdf
Restricted to Repository staff only

Download (277kB)
[img] Text
ARTIKEL KI.pdf
Restricted to Repository staff only

Download (539kB)

Abstract

In the rapidly evolving digital era, data protection has become crucial. Data stored in backup databases often includes highly sensitive and critical information, necessitating robust encryption methods to ensure confidentiality and integrity. This research aims to analyze and compare the performance of two encryption algorithms, namely RSA and Twofish, in the context of Backup Database encryption using the Deflate compression method. RSA is an asymmetric encryption algorithm known for its high level of security, while Twofish is a symmetric encryption algorithm efficient in terms of computational time and memory usage. This study reveals the advantages and disadvantages of each algorithm in specific applications, as well as how the Deflate compression method affects the efficiency of encryption and decryption. The results show that RSA, despite its high security, requires longer processing times compared to Twofish. Conversely, Twofish offers faster computation times and more efficient memory usage but has vulnerabilities related to the keys used. The combination of both algorithms with the Deflate compression method is not very efficient in enhancing storage efficiency and data transfer in Backup Database systems.

Item Type: Thesis (Skripsi)
Additional Information: [No.Panggil: 2010511005] [Pembimbing: Bayu Hananto] [Penguji 1: Jayanta] [Penguji 2: Ika Nurlaili Isnainiyah]
Uncontrolled Keywords: Cryptography, Encryption, Compression, Backup Database, RSA, Twofish, Deflate
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Divisions: Fakultas Ilmu Komputer > Program Studi Informatika (S1)
Depositing User: MUHAMMAD FADHILLAH AKBAR
Date Deposited: 17 Sep 2024 03:00
Last Modified: 17 Sep 2024 03:00
URI: http://repository.upnvj.ac.id/id/eprint/31658

Actions (login required)

View Item View Item