Implementation of Base64 and Rot47 Algorithm Combination For Hospital Patient Database Encryption
Abstract
Abstract—All agency agreed bring data is matter Which very important For protected so that problem security data is matter Which need noticed. Matter Which can done to protect data so that it cannot be misused by others is by use technique cryptography. Cryptography consists of a set of algorithms and techniques For change data become form other so that contents No read and can't explained by Who course that No own authority For read or write data which has been changed. In this study the encryption method used is an algorithm ROT47 to encrypt data where the existing data position will be changed in accordance with amount rotation Which There is, Then data return encrypted use Base64 algorithm which is a scheme of encoding binary data into ASCII code strings in accordance index on Base64. Research results This is Combination ROT47 and Base64 algorithms can be implemented to in system patient database encryption with okAll agency agreed bring data is matter Which very important For protected so that problem security data is matter Which need noticed. Matter Which can done to protect data so that it cannot be misused by others is by use technique cryptography. Cryptography consists of a set of algorithms and techniques For change data become form other so that contents No read and can't explained by Who course that No own authority For read or write data which has been changed. In this study the encryption method used is an algorithm ROT47 to encrypt data where the existing data position will be changed in accordance with amount rotation Which There is, Then data return encrypted use Base64 algorithm which is a scheme of encoding binary data into ASCII code strings in accordance index on Base64. Research results This is Combination ROT47 and Base64 algorithms can be implemented to in system patient database encryption with ok.
Full Text:
PDFReferences
D. Intannia, W. W. Widiyanto, and A. Widyoko, “Analysis of the Medical Record Document Maintenance System in the Filing Room of the Health Center Sei . Asam,” vol. 03, no. 01, pp. 37–43, 2022.
M. K. Kansiime, J. A. Tambo, I. Mugambi, M. Bundi, A. Kara, and C. Owuor, “COVID-19 implications on household income and food security in Kenya and Uganda: Findings from a rapid assessment,” World Dev., vol. 137, p. 105199, 2021.
P. Desain, U. Interface, and S. Informasi, “Journal Health Information Management Indonesian ( JHIMI ) ISSN 2829-6435 Perancangan Desain User Interface Sistem Informasi Peminjaman dan Pengembalian Dokumen Rekam Medis di Puskesmas Jabung Medical Record Documents at Jabung Public Health Center Journa,” vol. 03, no. 01, 2022.
R. F. Naryanto, M. K. Delimayanti, Kriswanto, A. D. N. I. Musyono, I. Sukoco, and M. N. Aditya, “Development of a mobile expert system for the diagnosis on motorcycle damage using forward chaining algorithm,” Indones. J. Electr. Eng. Comput. Sci., vol. 27, no. 3, pp. 1601–1609, 2022.
N. Taliasih and I. Afrianto, “Implementation of Rc4 and Base64 Combination Algorithm To Secure Client Database of Pt Infokes,” no. 102.
K. Koleci, M. Baldi, M. Martina, and G. Masera, “A hardware implementation for code-based post-quantum asymmetric cryptography,” CEUR Workshop Proc., vol. 2597, pp. 141–152, 2020.
E. P. Mondol, “The Impact of Block Chain and Smart Inventory System on Supply Chain Performance at Retail Industry,” Int. J. Comput. Inf. Manuf., vol. 1, no. 1, pp. 56–76, 2021.
de Rosal Ignatius Moses Setiadi, A. F. Najib, E. H. Rachmawanto, C. A. Sari, M. K. Sarker, and N. Rijati, “A comparative study MD5 and SHA1 algorithms to encrypt REST API authentication on mobile-based application,” 2019 Int. Conf. Inf. Commun. Technol. ICOIACT 2019, pp. 206–211, 2019.
A. Kumar and S. Garhwal, “State-of-the-Art Survey of Quantum Cryptography,” Arch. Comput. Methods Eng., vol. 28, no. 5, pp. 3831–3868, 2021.
S. Pirandola et al., “Advances in quantum cryptography,” Adv. Opt. Photonics, vol. 12, no. 4, p. 1012, 2020.
W. Muła and D. Lemire, “Base64 encoding and decoding at almost the speed of a memory copy,” Softw. - Pract. Exp., vol. 50, no. 2, pp. 89–97, 2020.
Muqorobin, S.Kom. MK. WM. Bahasa Pemrograman Web Basic Front End [Internet]. Edisi 1. M. Hasan Mak’uf, S.T. MS, editor. Sukoharjo: STIE AAS Press; 2022. 159 p. Available from: https://aaspress.stie-aas.ac.id/
M. Efendi, V. Sihombing, and S. Parulian, “Implementation and Use of Base64 Algorithm in Video File Security,” Sinkron, vol. 7, no. 1, pp. 243–247, 2022
DOI: https://doi.org/10.29040/ijcis.v3i4.115
Article Metrics
Abstract view : 293 timesPDF - 184 times
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 4.0 International License