Systematic Literature Review: Cybersecurity by Utilizing Cryptography Using the Data Encryption Standard (DES) Algorithm

Annisa Desianty, Imelda Imelda

Abstract


The world of information technology is currently developing very rapidly. This opens up opportunities in the development of computer applications, but it also creates opportunities for threats to alter and steal data or what is often known as cyber-crime. This action is a violation that can cause direct or indirect losses. Therefore, cyber-security is very important to protect user information from cyber-crime. Based on this description, this research will conduct a Systematic Literature Review (SLR) on cyber-security by utilizing cryptography using the DES algorithm. By using the SLR method, literature searches were conducted on Google Scholar or Garuda with the keywords for national journals "Data Encryption Standard Algorithm (DES)" and keywords for international journals "Data Encryption Standard Algorithm (DES)" from both national and international journals, and limiting articles from 2019 to 2023, and obtained selection results as many as 10 articles used from national journals and 10 articles used from international journals. So that this research is expected to increase the understanding of literature that reviews cyber-security by utilizing cryptography using the DES algorithm.


Keywords


Cybersecurity, Cryptography, Data Encryption Standard, Systematic Literature Review

Full Text:

PDF

References


H. A. Simanjuntak, H. Aspriyono and E. P. Rohmawan, "Sistem Keamanan Pesan Teks Berbasis Jaringan Menggunakan Algoritma Data Encryption Standard (DES)," Jurnal Komputer, Informasi dan Teknologi, pp. 613-621, 2022.

A. B. S. Damanik, I. Gunawan, B. E. Damanik, Sumarno and D. Hartam, "Implementasi Algoritma Data Encryption Standart (DES) Dalam Pengamanan Data Karyawan Ramayana Department Store," Journal of Computer System and Informatics (JoSYC), vol. 2, pp. 70-76, 2020.

A. Fauzi, "ANALISA KOMBINASI PESAN TEKS KE DALAM FILE AUDIO MEMANFAATKAN ALGORITMA DATA ENCRYPTION STANDARD DAN METODE END OF FILE," Jurnal Teknik Informatika Kaputama (JTIK), pp. 1-8, 2019.

M. A. Suharto and M. N. Apriyani, "Konsep Cyber Attack, Cyber Crime, Dan Cyber Warfare Dalam Aspek Hukum Internasional," Risalah Hukum, vol. 17, pp. 98-107, 2021.

C. Hidayatullah, "Jenis dan Dampak Cyber Crime," Prosiding SAINTEK: Sains dan Teknologi, pp. 216-221, 2023.

A. Farid, "13 Contoh Cyber Crime Atau Kejahatan Dunia Maya Yang Berbahaya," 30 Oktober 2022. [Online]. Available: https://www.exabytes.co.id/blog/contoh-cyber-crime/.

D. Nurfadlillah, "ANALISIS SENTIMEN MENGENAI KESADARAN MASYARAKAT INDONESIA TERHADAP KEAMANAN SIBER DALAM MENGHADAPI KEBOCORAN DATA MENGGUNAKAN ALGORITMA NAÏVE BAYES CLASSIFIER," Jurnal Elektro Luceat, vol. 9, 2023.

B. Fachri and R. M. Sembiring, "Pengamanan Data Teks Menggunakan Algoritma DES Berbasis Android," JURNAL MEDIA INFORMATIKA BUDIDARMA, pp. 110-116, 2020.

A. Fauzi and R. P. Rahayu, "KEAMANAN CITRA DIGITAL DENGAN MEMANFAATKAN PROSES PENERAPAN ALGORITMA DATA ENCRYPTION STANDART (DES) PADA EKTRAKSI PIXEL," Jurnal Informatika Kaputama(JIK), vol. 4, pp. 269-279, 2020.

B. N. Laia, N. B. Nugroho and J. Halim, "Implementasi Kriptografi Untuk Pengamanan Data Produksi Harian Dengan Algoritma Data Encryption Standard (DES) Pada PT. Cogindo," Jurnal CyberTech, 2020.

A. A. Pandiangan, N. B. Nugroho and A. Alhafiz, "IMPLEMENTASI KRIPTOGRAFI UNTUK MENGAMANKAN DATA ABSENSI KARYAWAN PADA PT. PENERBIT ERLANGGA MAHEMERU MEDAN MENGGUNAKAN (DATA ENCRYPTION STANDARD )," Jurnal CyberTech, pp. 1-15, 2021.

I. H. Wayangkau, "ENKRIPSI DATA GELOMBANG SUARA DENGAN ALGORITMA DES," MUSTEK ANIM HA, vol. 10, pp. 60-64, 2021.

N. Dwitri, S. Sindi, I. A. Sihombing and I. Gunawan, "PENGAMANAN DATA FILE DOCUMENT MENGUNAKAN KRIPTOGRAFI ENCRYPTION SYSTEM (DES)," JISICOM (Journal of Information System, Informatics and Computing), pp. 40-46, 2020.

D. Oktami, N. B. Nugroho and S. Murniyanti, "Implementasi Kriptografi Keamanan Data Transaksi Biaya Sewa Angkutan Truk Di PTPN II Dengan Mennggunakan Metode DES ( Data Encryption Standard)," Sains dan Komputer (SAINTIKOM), pp. 1-15, 2020.

N. D. P. Siregar, Azanuddin and W. R. Maya, "IMPLEMENTASI KRIPTOGRAFI PENGAMANAN DATA NILAI SISWA PADA SD NEGERI 064979 MEDAN DENGAN MENGGUNAKAN ALGORITMA DES," Jurnal CyberTech, 2019.

F. Triandini, S. Jayanatha, A. Indrawan, G. W. Putra and B. Iswara, "Metode Systematic Literature Review untuk Identifikasi Platform dan Metode Pengembangan Sistem Informasi di Indonesia," Indonesian Journal of Information Systems (IJIS), pp. 63-78, 2019.

D. Fitriani and A. Putra, "Systematic Literature Review (SLR):Eksplorasi Etnomatematika pada Makanan Tradisional," Journal of Mathematics Education and Learning, pp. 18-27, 2022.

A. W. Panjaitan, I. Zufria and Y. R. Nasution, "Implementation of Data Encryption Standard (DES) Algorithm for Data Security on PDF Documents," Zero : Jurnal Sains, Matematika, dan Terapan, pp. 231-237, 2022.

E. F. Ginting, K. Ibnutama and G. Suryanata, "Implementasi DES (Data Encryption Standard) Untuk Penyandian Data Bill Of Material pada Divisi Produksi PT.Siantar Top, Tbk," Sains dan Komputer (SAINTIKOM), pp. 161-166, 2019.

R. Muhammad, J. Raharjo and N. Andini, "IMPLEMENTASI DATA ENCRYPTION STANDARD (DES) PADA IMAGE WATERMARKING CITRA MENGGUNAKAN ALGORITMA DISCRETE COSINE TRANSFORM (DCT)," e-Proceeding of Engineering, pp. 4032-4036, 2019.

K. M. Mahulae, F. Taufik and U. F. S. Sitorus, "Implemantasi Kriptografi Pengamanan Data Tamu Pada Hotel Sibayak Multi Menggunakan Metode Data Encryption Standard (DES)," Jurnal CyberTech, pp. 1-14, 2019.

E. Fernando, Fachruddin, D. F. Murad, H. Rohayani and Pandapotan, "Analisa Dan Implementasi Algoritma Enkripsi Simetris Data Encryption Standard (DES) Pada Raspberry Pi," ULTIMATICS, pp. 55-60, 2019.

M. Suwarni, J. Wahyudi and Khairil, "Comparison of the DES Cryptographic Algorithm and the AES Algorithm in Securing Document Files," Jurnal Media Computer Science, vol. 2, pp. 41-48, 2023.

M. Z. Altim and Faisal, "ANALISIS PERBANDINGAN ALGORITMA RIVEST CHIPER 4 (RC4) DAN DATA ENCRYPTION STANDARD (DES) PADA STEGANOGRAFI," Jurnal INSTEK (Informatika Sains dan Teknologi), vol. 4, pp. 121-130, 2019.

H. Setiawan, M. I. Kamila and Yulandi, "ANALISIS KECEPATAN ENKRIPSI DEKRIPSI DAN ALOKASI MEMORI MENGGUNAKAN ALGORITMA DES, 3DES DAN ELGAMAL," INTI NUSA MANDIRI, vol. 17, pp. 70-78, 2022.

R. P. Saputra, J. Wahyudi and J. Jumadi, "Comparative Analysis of the Blowfish Algorithm and the Des Algorithm in the Document File Encryption and Decryption Process," Jurnal Komputer, Informasi, dan Teknologi, vol. 2, pp. 605-612, 2022.

R. V. Amorado, A. M. Sison and R. P. Medina, "Enhanced data encryption standard (DES) algorithm based on filtering and striding techniques," Proceedings of the 2nd International Conference on Information Science and Systems, pp. 252-256, 2019.

O. N. Akande, O. C. Abikoye, A. A. Kayode, O. T. Aro and O. R. Ogundokun, "A Dynamic Round Triple Data Encryption Standard Cryptographic Technique for Data Security," Springer Nature Switzerland, pp. 487-499, 2020.

Z. Kasiran, H. F. Ali and N. M. Noor, "Time performance analysis of advanced encryption standard and data encryption standard in data security transaction," Indonesian Journal of Electrical Engineering and Computer Science, pp. 988-994, 2019.

M. M. Alani, M. Alrammal and M. Naveed, "Implementing IoT Lottery on Data Encryption Standard," Journal of Communications, vol. 15, pp. 735-741, 2020.

Z. Lu, "Encryption Management of Accounting Data Based on DES Algorithm of Wireless Sensor Network," Hindawi, pp. 1-14, 2022.

K. S. Reddy, P. S. Karun, M. C. Shekar, G. S. Charan, P. S. Pavan and M. K, "DISTRIBUTED AND PARALLELIZED IMAGE ENCRYPTION USING DES," International Research Journal of Modernization in Engineering Technology and Science , pp. 280-287, 2020.

Logunleko, Adeniji and Logunleko, "A Comparative Study of Symmetric Cryptography Mechanism on DES, AES and EB64 for Information Security," International Journal of Scientific Research in Computer Science and Engineering, pp. 45-51, 2020.

N. A. Al-gohany and S. Almotairi, "Comparative Study of Database Security In Cloud Computing Using AES," Journal of Information Security & Cybercrimes Research, vol. 2, pp. 102-109, 2019.

K. Patel, "Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files," International Journal of Information Technology, pp. 813-819, 2019.

P. Soni and R. Malik, "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models," Turkish Journal of Computer and Mathematics Education, vol. 12, pp. 1699-1708, 2021.

J. H. Sinaga, M. Pangaribuan, Fazly, I. Rivaldo and I. Gunawan, "Penerapan EnkripsiDan DeskripsiMenggunakan Algoritma Data Encryption Standart (DES)Dengan Pemograman Matlab," JURNAL MEDIA INFORMATIKA[JUMIN], pp. 63-69, 2022.

A. Pratama, M. N. Arif, M. Nazir, Z. Dannaun and Dara, "ALGORITMA DES ( DATA ENCRYPTION STANDARD ) UNTUK KEAMANAN DIGITAL," JURNAL SITEBA, pp. 15-19, 2023.

K. Gondlach, "WHAT IS FUTURES RESEARCH?," 2023. [Online]. Available: https://www.kaigondlach.de/en/what-is-futures-research/.

M. Suwarni, J. Wahyudi and Khairil, "Comparison of the DES Cryptographic Algorithm and the AES Algorithm in Securing Document Files," Jurnal Media Computer Science, vol. 2, pp. 41-48, 2023.




DOI: https://doi.org/10.15408/jti.v17i1.37256 Abstract - 0 PDF - 0

Refbacks



Copyright (c) 2024 Annisa Desianty

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

3rd Floor, Dept. of Informatics, Faculty of Science and Technology, UIN Syarif Hidayatullah Jakarta
Jl. Ir. H. Juanda No.95, Cempaka Putih, Ciputat Timur.
Kota Tangerang Selatan, Banten 15412
Tlp/Fax: +62 21 74019 25/ +62 749 3315
Handphone: +62 8128947537
E-mail: jurnal-ti@apps.uinjkt.ac.id


Creative Commons Licence
Jurnal Teknik Informatika by Prodi Teknik Informatika Universitas Islam Negeri Syarif Hidayatullah Jakarta is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at http://journal.uinjkt.ac.id/index.php/ti.

JTI Visitor Counter: View JTI Stats

 Flag Counter