IMPLEMENTASI ALGORITMA BLOWFISH PADA SISTEM MANAJEMEN SURAT DENGAN PENDEKATAN RATIONAL UNIFIED PROCESS YANG RAMAH LINGKUNGAN
DOI:
https://doi.org/10.30656/jsii.v11i2.9065Abstract
In many organizations, including the Institut Teknologi Perusahaan Listrik Negara (ITPLN), letter management and organization is very important. This process is often resource-intensive and time-consuming. With the advancement of information technology, a secure digital system can help optimize letter management. The implementation of Blowfish cryptographic algorithm for encryption of important data on letter stored in a digital-based letter management system is the subject of this research. This method lowers the potential for eavesdropping and data theft. In the development process of this system, the Rational Unified Process (RUP) methodology takes the principle of green computing, which helps improve the efficiency of environmental destruction. The system adopts a paperless office paradigm, addresses the issue of operational inefficiencies, and safeguards sensitive data. The Blowfish algorithm prevents irresponsible people from compromising the database. This research produces a secure letter management information system using blowfish algorithm and developed using RUP that is environmentally friendly in contribution to the efficiency of environmental destruction caused by software development.
Keywords: Blowfish Algorithm, Rational Unified Process, Data Security, Letter Management, Eco-Friendly Software
References
R. E. G. Rahayu, A. Sutedi, and V. A. Rahayu, “Sistem Informasi Pengelolaan Surat Online Desa Menggunakan Metode Rational Unified Procces Berbasis Web,†Jurnal Algoritma, vol. 19, no. 1, pp. 239–246, 2022, doi: https://doi.org/10.33364/algoritma/v.19-1.1052.
E. P. Sitopu, N. Khairina, and R. Muliono, “Sistem Informasi Manajemen Data Surat Dengan Algoritma Blowfish,†Jurnal Ilmiah Sistem Informasi, vol. 6, no. 1, pp. 49–59, 2022.
A. Rahayu, A. P. Ardana, C. Pramudhita, D. Syafitri, and R. Z. Sirega, “Perbandingan Algoritma RSA dengan Algoritma Blowfish Pada Perancangan Aplikasi Keamanan Data,†Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI, vol. 7, no. 1, pp. 203–207, 2024.
M. Dhaini, M. Jaber, A. Fakhereldine, S. Hamdan, and R. A. Haraty, “Green Computing Approaches - A Survey,†Informatica, vol. 45, no. 1, pp. 1–12, Mar. 2021, doi: 10.31449/inf.v45i1.2998.
H. Jatnika, M. F. Rifai, and L. T. E. Napitupulu, “Implementation of the Rational Unified Process (Rup) Method in Designing a Web-Based Certification Scheduling Application (Citation) on Itcc Itpln,†Syntax Idea, vol. 5, no. 4, pp. 452–458, Apr. 2023, doi: 10.46799/syntax-idea.v5i4.2188.
M. Sudarma, S. Ariyani, and P. A. Wicaksana, “Implementation of the Rational Unified Process (RUP) Model in Design Planning of Sales Order Management System,†INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi, vol. 5, no. 2, pp. 249–265, Aug. 2021, doi: 10.29407/intensif.v5i2.15543.
Y. Bagus, A. Rahman, and B. Sugiantoro, “The Development of Web-Based Paperless Office System Using CodeIgniter Framework Case Study of Lembaga Pengembangan Cabang Ranting Muhammadiyah,†Proceeding International Conference on Science and Engineering, vol. 3, pp. 221–227, Apr. 2020, doi: 10.14421/icse.v3.501.
S. Soobia.et.al., “Analysis of Software Development Methodologies,†International Journal of Computing and Digital Systems, vol. 8, no. 5, pp. 445–460, Jan. 2019, doi: 10.12785/ijcds/080502.
F. Firmansyah, M. Y. D. Sudirman, and R. I. Putra, “Integrating green computing into rational unified process for sustainable development goals: a comprehensive approach,†International Journal of Electrical and Computer Engineering (IJECE), vol. 14, no. 3, pp. 2868–2874, Jun. 2024, doi: 10.11591/ijece.v14i3.pp2868-2874.
C. R. Suryanto, M. Fajar, and Hasniati, “Pemanfaatan Enkripsi Data Berbasis Algoritma Blowfish Pada Aplikasi Password Manager RememberMe!,†KHARISMA Tech, vol. 19, no. 1, pp. 64–74, Nov. 2023, doi: 10.55645/kharismatech.v19i1.421.
D. Ramalinda, Jayadi, and A. R. Raharja, “Strategi Perlindungan Data Menggunakan Sistem Kriptografi Dalam Keamanan Informasi,†Journal of International Multidisciplinary Research, vol. 2, no. 6, pp. 665–671, Jun. 2024, doi: 10.62504/jimr679.
R. Silalahi, I. Parlina, Sumarno, I. Gunawan, and W. Saputra, “Implementasi Algoritma Caesar Cipher Dan Algoritma Rsa Untuk Keamanan Data Surat Wasiat Pada Kantor Notaris/PPAT Robert Tampubolon,S.H.,†Sostech Greenvest, vol. 1, no. 4, pp. 282–293, Apr. 2021.
E. Setyawati, C. E. Widjayanti, R. R. Siraiz, and H. Wijoyo, “Pengujian keamanan komputer kriptografi pada surat elektronik berbasis website dengan enkripsi metode MD5,†Jurnal Manajamen Informatika Jayakarta, vol. 1, no. 1, p. 56, Feb. 2021, doi: 10.52362/jmijayakarta.v1i1.367.
T. R. Syafutra, K. Khairil, and E. Suryana, “The Implementation Of Modern Cryptography On Document Data Security,†Jurnal Media Computer Science, vol. 1, no. 2, Jul. 2022, doi: 10.37676/jmcs.v1i2.2742.
H. Nasution, H. Priyanto, and N. Widya, “Penerapan Digital Signature Untuk Persuratan Dengan Menggunakan Metode Algoritma Sha-1 Di Sektor Pertanian, Ketahanan Pangan Dan Perikanan Kab. Mempawah,†Scientica: Jurnal Ilmiah Sains dan Teknologi, vol. 2, no. 4, pp. 131–149, 2024.
A. H. Hasugian, R. A. Putri, and A. S. Zuhri, “Penerapan Metode Elgamal Untuk Mengamankan Teks Pada File Dokumen Word,†KLIK: Kajian Ilmiah Informatika dan Komputer, vol. 4, no. 2, pp. 1143–1153, 2023.
M. Irvai and N. Efranda, “Implementasi Algoritma SHA512 Pada Keamanan Berita Acara Hasil Sidang Berbasis Web,†Journal of Information Technology Ampera (JOURNAL-ITA), vol. 3, no. 3, pp. 453–466, 2022.
Downloads
Published
Issue
Section
License
- This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
-
Author(s)' Warranties
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).
- Information
- Notice about change in the copyright policy of the journal 'Jurnal Sistem Informasi (JSiI)' : "From Vol 1, onwards the copyright of the article published in the journal 'Jurnal Sistem Informasi' will be retained by the author"