IMPLEMENTASI ALGORITMA BLOWFISH PADA SISTEM MANAJEMEN SURAT DENGAN PENDEKATAN RATIONAL UNIFIED PROCESS YANG RAMAH LINGKUNGAN

Authors

  • Filan Firmansyah Universitas Indraprasta PGRI
  • Saputra Dwi Nurchaya Universitas Indraprasta PGRI
  • Zuhana Realita Alfy Universitas Indraprasta PGRI

DOI:

https://doi.org/10.30656/jsii.v11i2.9065

Abstract

In many organizations, including the Institut Teknologi Perusahaan Listrik Negara (ITPLN), letter management and organization is very important. This process is often resource-intensive and time-consuming. With the advancement of information technology, a secure digital system can help optimize letter management. The implementation of Blowfish cryptographic algorithm for encryption of important data on letter stored in a digital-based letter management system is the subject of this research. This method lowers the potential for eavesdropping and data theft. In the development process of this system, the Rational Unified Process (RUP) methodology takes the principle of green computing, which helps improve the efficiency of environmental destruction. The system adopts a paperless office paradigm, addresses the issue of operational inefficiencies, and safeguards sensitive data. The Blowfish algorithm prevents irresponsible people from compromising the database. This research produces a secure letter management information system using blowfish algorithm and developed using RUP that is environmentally friendly in contribution to the efficiency of environmental destruction caused by software development.

 

Keywords: Blowfish Algorithm, Rational Unified Process, Data Security, Letter Management, Eco-Friendly Software

References

R. E. G. Rahayu, A. Sutedi, and V. A. Rahayu, “Sistem Informasi Pengelolaan Surat Online Desa Menggunakan Metode Rational Unified Procces Berbasis Web,†Jurnal Algoritma, vol. 19, no. 1, pp. 239–246, 2022, doi: https://doi.org/10.33364/algoritma/v.19-1.1052.

E. P. Sitopu, N. Khairina, and R. Muliono, “Sistem Informasi Manajemen Data Surat Dengan Algoritma Blowfish,†Jurnal Ilmiah Sistem Informasi, vol. 6, no. 1, pp. 49–59, 2022.

A. Rahayu, A. P. Ardana, C. Pramudhita, D. Syafitri, and R. Z. Sirega, “Perbandingan Algoritma RSA dengan Algoritma Blowfish Pada Perancangan Aplikasi Keamanan Data,†Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI, vol. 7, no. 1, pp. 203–207, 2024.

M. Dhaini, M. Jaber, A. Fakhereldine, S. Hamdan, and R. A. Haraty, “Green Computing Approaches - A Survey,†Informatica, vol. 45, no. 1, pp. 1–12, Mar. 2021, doi: 10.31449/inf.v45i1.2998.

H. Jatnika, M. F. Rifai, and L. T. E. Napitupulu, “Implementation of the Rational Unified Process (Rup) Method in Designing a Web-Based Certification Scheduling Application (Citation) on Itcc Itpln,†Syntax Idea, vol. 5, no. 4, pp. 452–458, Apr. 2023, doi: 10.46799/syntax-idea.v5i4.2188.

M. Sudarma, S. Ariyani, and P. A. Wicaksana, “Implementation of the Rational Unified Process (RUP) Model in Design Planning of Sales Order Management System,†INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi, vol. 5, no. 2, pp. 249–265, Aug. 2021, doi: 10.29407/intensif.v5i2.15543.

Y. Bagus, A. Rahman, and B. Sugiantoro, “The Development of Web-Based Paperless Office System Using CodeIgniter Framework Case Study of Lembaga Pengembangan Cabang Ranting Muhammadiyah,†Proceeding International Conference on Science and Engineering, vol. 3, pp. 221–227, Apr. 2020, doi: 10.14421/icse.v3.501.

S. Soobia.et.al., “Analysis of Software Development Methodologies,†International Journal of Computing and Digital Systems, vol. 8, no. 5, pp. 445–460, Jan. 2019, doi: 10.12785/ijcds/080502.

F. Firmansyah, M. Y. D. Sudirman, and R. I. Putra, “Integrating green computing into rational unified process for sustainable development goals: a comprehensive approach,†International Journal of Electrical and Computer Engineering (IJECE), vol. 14, no. 3, pp. 2868–2874, Jun. 2024, doi: 10.11591/ijece.v14i3.pp2868-2874.

C. R. Suryanto, M. Fajar, and Hasniati, “Pemanfaatan Enkripsi Data Berbasis Algoritma Blowfish Pada Aplikasi Password Manager RememberMe!,†KHARISMA Tech, vol. 19, no. 1, pp. 64–74, Nov. 2023, doi: 10.55645/kharismatech.v19i1.421.

D. Ramalinda, Jayadi, and A. R. Raharja, “Strategi Perlindungan Data Menggunakan Sistem Kriptografi Dalam Keamanan Informasi,†Journal of International Multidisciplinary Research, vol. 2, no. 6, pp. 665–671, Jun. 2024, doi: 10.62504/jimr679.

R. Silalahi, I. Parlina, Sumarno, I. Gunawan, and W. Saputra, “Implementasi Algoritma Caesar Cipher Dan Algoritma Rsa Untuk Keamanan Data Surat Wasiat Pada Kantor Notaris/PPAT Robert Tampubolon,S.H.,†Sostech Greenvest, vol. 1, no. 4, pp. 282–293, Apr. 2021.

E. Setyawati, C. E. Widjayanti, R. R. Siraiz, and H. Wijoyo, “Pengujian keamanan komputer kriptografi pada surat elektronik berbasis website dengan enkripsi metode MD5,†Jurnal Manajamen Informatika Jayakarta, vol. 1, no. 1, p. 56, Feb. 2021, doi: 10.52362/jmijayakarta.v1i1.367.

T. R. Syafutra, K. Khairil, and E. Suryana, “The Implementation Of Modern Cryptography On Document Data Security,†Jurnal Media Computer Science, vol. 1, no. 2, Jul. 2022, doi: 10.37676/jmcs.v1i2.2742.

H. Nasution, H. Priyanto, and N. Widya, “Penerapan Digital Signature Untuk Persuratan Dengan Menggunakan Metode Algoritma Sha-1 Di Sektor Pertanian, Ketahanan Pangan Dan Perikanan Kab. Mempawah,†Scientica: Jurnal Ilmiah Sains dan Teknologi, vol. 2, no. 4, pp. 131–149, 2024.

A. H. Hasugian, R. A. Putri, and A. S. Zuhri, “Penerapan Metode Elgamal Untuk Mengamankan Teks Pada File Dokumen Word,†KLIK: Kajian Ilmiah Informatika dan Komputer, vol. 4, no. 2, pp. 1143–1153, 2023.

M. Irvai and N. Efranda, “Implementasi Algoritma SHA512 Pada Keamanan Berita Acara Hasil Sidang Berbasis Web,†Journal of Information Technology Ampera (JOURNAL-ITA), vol. 3, no. 3, pp. 453–466, 2022.

Downloads

Published

2024-09-15

Issue

Section

Articles