Metrics

  • visibility 0 views
  • get_app 3 downloads
description Journal article public Login

Implementation of Data Based Record Security Using the Luc Method

Sakaria Efrata Ginting, Hery Sunandar, Zekson Arizona Matondang
Published 30 December 2019

Abstract

Cryptography is defined as the study of how to hide messages so that they cannot be read by those who are not blessed. Security in cryptography has become a very important aspect of an information system. Security problems often get less attention from designers and processors. Cryptography applications can be used to secure data. Therefore, database record users need help to meet the security needs of data stored in a Database Record or database. Records are the contents or data of managed tables that are interrelated and various data are stored in the table and cannot be manipulated. One of the safest methods for the above purposes is to use the Luc safety technique. Luc is a public cryptographic algorithm that uses a set of prime numbers to generate public and private keys. In this research, we will try to implement a mathematical science called cryptography. With the existence of cryptography which includes the encryption and decryption process, messages, data, and information can be coded so that unauthorized people cannot read the information and return it to its original state, other than people who do not know the key to decrypt it.

Full text

 

Metrics

  • visibility 0 views
  • get_app 3 downloads