Pengamanan Perintah Koneksi ke Database MySQL Menggunakan Algoritma Caesar Cipher dan Algoritma Stout Codes
Abstract
The MySQL database system is one of the database systems that is widely used in the world, both for personal and corporate purposes. However, the increasing number of cyber attacks occurring on database systems makes it increasingly important to secure data security in database systems. Cyber attacks can be via SQL Injection or hacking via connection commands to the database using the application whose database you want to hack. This is the focus of the problem, so it is necessary to secure connections to the database using cryptographic algorithms. This research aims to improve the security of the MySQL database system by implementing the Caesar Cipher cryptography technique and the Stout Codes compression technique in connection commands to the database via a client application built using the Visual Basic programming language. The testing method used in this research is experimental, where the MySQL database system is tested using ordinary connection commands and connection commands that have been encrypted with the Caesar Cipher algorithm and the Stout Sodes algorithm. The test results show that the use of the Caesar Cipher and Stout Codes crypto-compression systems can increase the security of the MySQL database system by making access difficult for unauthorized parties with a success percentage of 100%. Thus, it is hoped that this research can contribute to improving the security of the MySQL database system which is currently increasingly vulnerable to cyber attacks
References
B. Purnama and A. H. H. Rohayani, “A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext from a Message to Be Encrypted,” Procedia Comput Sci, vol. 59, no. Iccsci, pp. 195–204, 2015, doi: 10.1016/j.procs.2015.07.552.
P. Verma, G. S. Gaba, and R. Miglani, “Diversified Caesar Cipher for Impeccable Security,” International Journal of Security and Its Applications, vol. 11, no. 2, pp. 33–40, 2017, doi: 10.14257/ijsia.2017.11.2.04.
A. Mishra, “Enhancing Security of Caesar Cipher Using Different Methods,” Int J Res Eng Technol, vol. 02, no. 09, pp. 327–332, 2013, doi: 10.15623/ijret.2013.0209049.
F. I. Lubis, H. F. S. Simbolon, T. P. Batubara, and R. W. Sembiring, “Combination of caesar cipher modification with transposition cipher,” Advances in Science, Technology and Engineering Systems, vol. 2, no. 5, pp. 22–25, 2017, doi: 10.25046/aj020504.
P. E. Ismael Imran and P. F. abdulameerabdulkareem, “Enhancement Caesar Cipher for Better Security,” IOSR J Comput Eng, vol. 16, no. 3, pp. 01–05, 2014, doi: 10.9790/0661-16350105.
O. E. Omolara, A. I. Oludare, and S. E. Abdulahi, “Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication,” Issn, vol. 5, no. 5, pp. 2222–1719, 2014, [Online]. Available: www.iiste.org
A. Jain, R. Dedhia, and A. Patil, “Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication,” Int J Comput Appl, vol. 129, no. 13, pp. 6–11, 2015, doi: 10.5120/ijca2015907062.
I. W. Utomo, R. Latifah, and D. Risanty, “Aplikasi Kriptografi Berbasis Android Menggunakan Algoritma Caesar Cipher Dan Vigenere Cipher,” Jurnal Sistem Informasi, Teknologi Informasi dan Komputer, vol. 9, no. 2, pp. 142–149, 2018.
P. N. Arifah and W. A. Basuki, “Implementasi Kriptografi Caesar Chiper,” SEMINAR MATEMATIKA DAN PENDIDIKAN MATEMATIKA UNY 2017, pp. 297–304, 2017.
M. L. Wijaya, K. Yulianti, and H. S. Husain, “Caesar Cipher Dan Affine Cipher Untuk Mengubah Pesan Rahasia,” E u r e k a M a t i k a, vol. 5, no. 1, pp. 30–45, 2017.
S. K. Verma and D. B. Ojha, “An innovative Enciphering Scheme based on Caesar Cipher,” International Journal of Innovative Science, Engineering & Technology (IJSET), vol. 1, no. 5, pp. 25–27, 2014.
F. N. Nife, “A New Modified Cesar Cipher Cryptographic Method Along With Rail Fence to Encrypt Message 1-Dynamic Key Generation,” Int J Adv Res (Indore), vol. 3, no. 2, pp. 331–335, 2015.
Y. Dwi Putri, R. Rosihan, and S. Lutfi, “Penerapan Kriptografi Caesar Cipher Pada Fitur Chatting Sistem Informasi Freelance,” JIKO (Jurnal Informatika dan Komputer), vol. 2, no. 2, pp. 87–94, 2019, doi: 10.33387/jiko.v2i2.1319.
B. Oktaviana and A. P. Utama Siahaan, “Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography,” IOSR J Comput Eng, vol. 18, no. 04, pp. 26–29, 2016, doi: 10.9790/0661-1804032629.
S. Y. Wulandari, “Cryptography : A Combination of Caesar and Affine Cipher to Conceal the Message,” PROC. INTERNAT. CONF. SCI. ENGIN., vol. 3, no. April, pp. 741–744, 2020.
L. Marlina, A. Putera, U. Siahaan, H. Kurniawan, and I. Sulistianingsih, “Data Compression Using Elias Delta Code,” International Journal of Recent Trends in Engineering & Research, vol. 3, no. 8, pp. 210–217, 2017, doi: 10.23883/IJRTER.2017.3406.TEGS6.
S. D. Nasution, “Data Compression Using Stout Codes,” The IJICS (International Journal of Informatics and Computer Science), vol. 3, no. 1, pp. 28–33, 2019.
S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” International Journal of Engineering Research & Technology (IJERT), vol. 6, no. 01, pp. 360–363, 2017.
A. Singh and Y. Bhatnagar, “Enhancement of Data Compression Using Incremental Encoding,” Int J Sci Eng Res, vol. 3, no. 5, pp. 1457–1465, 2012, [Online]. Available: http://www.ijser.org/paper/Enhancement-of-Data-Compression-Using-Incremental-Encoding.html
D. Salomon and G. Motta, HandBook Of Data Compression. Springer, 2010.
Copyright (c) 2024 Surya Darma Nasution

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


.png)
.png)


