Implementation of Base64 and Rot47 Algorithm Combination For Hospital Patient Database Encryption

Dwi Iskandar, Suriana Ismail, Canggih Ajika Pamungkas, Edy Susena

Abstract


AbstractAll agency agreed bring data is matter Which very important For protected so that problem security data is matter Which need noticed. Matter Which can done to protect data so that it cannot be misused by others is by use technique cryptography. Cryptography consists of a set of algorithms and techniques For change data become form other so that contents No read and can't explained by Who course that No own authority For read or write data which has been changed. In this study the encryption method used is an algorithm ROT47 to encrypt data where the existing data position will be changed in accordance with amount rotation Which There is, Then data return encrypted use Base64 algorithm which is a scheme of encoding binary data into ASCII code strings in accordance index on Base64. Research results This is Combination ROT47 and Base64 algorithms can be implemented to in system patient database encryption with okAll agency agreed bring data is matter Which very important For protected so that problem security data is matter Which need noticed. Matter Which can done to protect data so that it cannot be misused by others is by use technique cryptography. Cryptography consists of a set of algorithms and techniques For change data become form other so that contents No read and can't explained by Who course that No own authority For read or write data which has been changed. In this study the encryption method used is an algorithm ROT47 to encrypt data where the existing data position will be changed in accordance with amount rotation Which There is, Then data return encrypted use Base64 algorithm which is a scheme of encoding binary data into ASCII code strings in accordance index on Base64. Research results This is Combination ROT47 and Base64 algorithms can be implemented to in system patient database encryption with ok.


Full Text:

PDF

References


D. Intannia, W. W. Widiyanto, and A. Widyoko, “Analysis of the Medical Record Document Maintenance System in the Filing Room of the Health Center Sei . Asam,” vol. 03, no. 01, pp. 37–43, 2022.

M. K. Kansiime, J. A. Tambo, I. Mugambi, M. Bundi, A. Kara, and C. Owuor, “COVID-19 implications on household income and food security in Kenya and Uganda: Findings from a rapid assessment,” World Dev., vol. 137, p. 105199, 2021.

P. Desain, U. Interface, and S. Informasi, “Journal Health Information Management Indonesian ( JHIMI ) ISSN 2829-6435 Perancangan Desain User Interface Sistem Informasi Peminjaman dan Pengembalian Dokumen Rekam Medis di Puskesmas Jabung Medical Record Documents at Jabung Public Health Center Journa,” vol. 03, no. 01, 2022.

R. F. Naryanto, M. K. Delimayanti, Kriswanto, A. D. N. I. Musyono, I. Sukoco, and M. N. Aditya, “Development of a mobile expert system for the diagnosis on motorcycle damage using forward chaining algorithm,” Indones. J. Electr. Eng. Comput. Sci., vol. 27, no. 3, pp. 1601–1609, 2022.

N. Taliasih and I. Afrianto, “Implementation of Rc4 and Base64 Combination Algorithm To Secure Client Database of Pt Infokes,” no. 102.

K. Koleci, M. Baldi, M. Martina, and G. Masera, “A hardware implementation for code-based post-quantum asymmetric cryptography,” CEUR Workshop Proc., vol. 2597, pp. 141–152, 2020.

E. P. Mondol, “The Impact of Block Chain and Smart Inventory System on Supply Chain Performance at Retail Industry,” Int. J. Comput. Inf. Manuf., vol. 1, no. 1, pp. 56–76, 2021.

de Rosal Ignatius Moses Setiadi, A. F. Najib, E. H. Rachmawanto, C. A. Sari, M. K. Sarker, and N. Rijati, “A comparative study MD5 and SHA1 algorithms to encrypt REST API authentication on mobile-based application,” 2019 Int. Conf. Inf. Commun. Technol. ICOIACT 2019, pp. 206–211, 2019.

A. Kumar and S. Garhwal, “State-of-the-Art Survey of Quantum Cryptography,” Arch. Comput. Methods Eng., vol. 28, no. 5, pp. 3831–3868, 2021.

S. Pirandola et al., “Advances in quantum cryptography,” Adv. Opt. Photonics, vol. 12, no. 4, p. 1012, 2020.

W. Muła and D. Lemire, “Base64 encoding and decoding at almost the speed of a memory copy,” Softw. - Pract. Exp., vol. 50, no. 2, pp. 89–97, 2020.

Muqorobin, S.Kom. MK. WM. Bahasa Pemrograman Web Basic Front End [Internet]. Edisi 1. M. Hasan Mak’uf, S.T. MS, editor. Sukoharjo: STIE AAS Press; 2022. 159 p. Available from: https://aaspress.stie-aas.ac.id/

M. Efendi, V. Sihombing, and S. Parulian, “Implementation and Use of Base64 Algorithm in Video File Security,” Sinkron, vol. 7, no. 1, pp. 243–247, 2022




DOI: https://doi.org/10.29040/ijcis.v3i4.115

Article Metrics

Abstract view : 292 times
PDF - 184 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License