Please use this identifier to cite or link to this item: https://repository.unej.ac.id/xmlui/handle/123456789/113377
Full metadata record
DC FieldValueLanguage
dc.contributor.authorROHIM, Muhamat Abdul-
dc.contributor.authorSANTOSO, Kiswara Agung-
dc.contributor.authorHADI, Alfian Futuhul-
dc.date.accessioned2023-03-24T02:37:57Z-
dc.date.available2023-03-24T02:37:57Z-
dc.date.issued2021-02-08-
dc.identifier.urihttps://repository.unej.ac.id/xmlui/handle/123456789/113377-
dc.description.abstractThe condition of the world experiencing the COVID-19 pandemic has resulted in some daily activities limited by health protocols. The Indonesian government's policy in the academic field has forced STIE Mandala Jember, as one of the private universities, to implement online-based new student admissions. The registrant's identity must be kept confidential during the online-based new student registration process, so the running system needs an identity coding (encryption) process. Hill Cipher is a cryptographic algorithm that utilizes the multiplication of matrix inverse operations. In ordinary Hill Cipher, to encrypt the entire plaintext, a key is needed. In this paper, we will modify the Hill Cipher named Hill Cipher Chain. The process of chained Hill Cipher will encrypt and decrypt the primary key based on the previous character. Firstly, we will encrypt the primary key with the key from the next column of the database. In this case, we use the name column. The encryption result will be used as a key for the subsequent character encryption. Implementation of this method makes the difficulty level of decryption more complex than the ordinary Hill Cipher, which only uses one key for all so that the security of the data obtained is also getting better.en_US
dc.language.isoenen_US
dc.publisherAtlantis Pressen_US
dc.subjectInverse matrixen_US
dc.subjectcryptographyen_US
dc.subjectHill cipheren_US
dc.subjectChained Hill cipheren_US
dc.subjectHill cipher chainen_US
dc.titlePrimary Key Encryption Using Hill Cipher Chain (Case Study: STIE Mandala PMB Site)en_US
dc.typeArticleen_US
Appears in Collections:LSP-Conference Proceeding

Files in This Item:
File Description SizeFormat 
FMIPA_Primary Key Encryption Using Hill Cipher Chain.pdf7.73 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.