Implementasi Algoritma Seal Pada Pengamanan Data Penjualan Tiket PT. Amanda Tour & Travel
Abstract
- SEAL is a type of stream cipher, which processes units or input data, messages or information at one time. Units or data are generally bytes. In this way, encryption or decryption can be performed on variable lengths. This algorithm does not have to wait for a certain amount of input data, messages or information before processing, or add additional bytes for encryption. The encryption technique used in the SEAL algorithm is to encrypt and decrypt each input data to secure customer data at PT. Amanda Tour & Travel, a travel company in Medan that provides airline ticket booking services. To prove the encryption results, direct access to the system is demonstrated by applying the SEAL algorithm stored in the database using a database access interface. The cryptographic algorithm to be used in securing PT. Amanda Tour & Travel is a symmetric cryptographic algorithm and a stream cipher, so that the encrypted data (ciphertext) has the same size as the original data (plaintext). Symmetric cryptography was chosen because it is expected that this algorithm will securely encrypt and decrypt customer data.
References
. R. Sadikin, “Kriptografi Untuk Keamanan Jaringan dan Implementasinya
. Dalam Bahasa Java”, Yogyakarta : ANDI. 2012.
. Semuil Tjihardi, Marvin Chandra Wijaya, “Pengamanan Data Dengan Menggunakan Algoritma Stream Chiper Seal”, Konfrensi Nasional Sistem dan Informatika, KNS&109-010, 2009.
. Donny Arius, Pengantar Ilmu Kriptografi : Teori, Analisis, Dan Implementasi, Yogyakarta : ANDI. 2008.
. R. Munir, “Kriptografi”, Bandung : Informatika. 2006.
. M. Nafarin Penganggaran Perusahaan, Jakarta : Salemba Empat, 2009.
. Assauri Sofyan, Manajemen Pemasaran Edisi Pertama, Jakarta : Rajawali Pers, 2011
. S. Sembiring, “ Perancangan Aplikasi Steganografi Untuk Menyisipkan
. Pesan”, Pelita Informatika Budidarma, Vol. IV, No.2, ISSN : 2301-9425. 2011.
. Z. Mawati, J. Kharis, S. Yuliana, “ Aplikasi Pengamanan File Video Menggunakan Teknik Kriptografi Algoritma Transposisi Zig-Zag”, Jurnal Mahajana Informasi, Vol. III, No.2, ISSN : 2257-8290. 2018.
. Ade Hendini, “Pemodal UML Sistem Informasi Monitoring Penjualan dan Stok Barang (Studi Kasus : Distro Zhezha Pontianak)”, Jurnal Khatulistiwa Informatika, Vol.IV,No.2, 2006.
. [Abdul Kadir, Pengenalan Algoritma Pendekatan secara Visual dan Interaktif Menggunakan RAPTOR, Yogyakarta : ANDI. 2013.
. Astria Firman, Hans. F. Wowor, Xaverius Najoan, “ Sistem Informasi Perpustakaan Online Berbasis Web”, E-Journal Teknik Elektro dan Komputer, Vol.V, No.2. ISSN 2301-8402, 2016
. Hendrayudi, “ Dasar-Dasar Pemograman Microsoft Visual Basic 2008,
. Bandung : PT.Satu Nusa. 2011.
. Haryanto Bambang, Rekayasa Sistem Berorientasi Objek, Bandung : Informatika, 2004.
Copyright (c) 2025 Suwondo

This work is licensed under a Creative Commons Attribution 4.0 International License.



