ARTÍCULO
TITULO

Transaction Data Security Using AES and RC4 DOI : 10.24114/cess.v8i1.41212 | Abstract views : 25 times

Puji Sari Ramadhan    
Muhammad Syahril    
Rini Kustini    
Hendryan Winata    
Robin Darwis Gea    

Resumen

This study discusses the effectiveness of using AES (Advanced Encryption Standard) and RC4 (Rivest Chipper 4) as digital data security algorithms to prevent and protect transaction data from irresponsible parties. This needs to be done because the development of sales transactions or other services has used digital technology a lot. This situation causes the need to secure digital data from existing transactions, so that transaction data can be stored safely. Transaction data security is carried out by changing data into ciphers or codes that are difficult to read using the AES (Advanced Encryption Standard) and RC4 (Rivest Cipher 4) algorithms. This research begins by collecting existing transaction data and then transforming it into ASCII code. The results of the transformation will be used to perform calculations using the AES algorithm. After completing the calculation process using the AES algorithm, then do the calculations using RC4. These results will be stored in the database so that the transaction data that has turned into these codes cannot be known by other parties. The combination of the AES and RC4 algorithms is carried out to strengthen data encryption because there are more and more rotation systems and double security is carried out so that digital data is not easily read and misused. With the presence of this research, it can be shown that the AES and RC4 algorithms are capable of encrypting existing transaction data with multiple levels of security. 

Palabras claves

 Artículos similares

       
 
Loris Belcastro, Domenico Carbone, Cristian Cosentino, Fabrizio Marozzo and Paolo Trunfio    
Since the advent of Bitcoin, the cryptocurrency landscape has seen the emergence of several virtual currencies that have quickly established their presence in the global market. The dynamics of this market, influenced by a multitude of factors that are d... ver más
Revista: Algorithms

 
Felix Kahmann, Fabian Honecker, Julian Dreyer, Marten Fischer and Ralf Tönjes    
Since the introduction of the first cryptocurrency, Bitcoin, in 2008, the gain in popularity of distributed ledger technologies (DLTs) has led to an increasing demand and, consequently, a larger number of network participants in general. Scaling blockcha... ver más
Revista: Computers

 
Radhakrishna Dodmane, Raghunandan K. R., Krishnaraj Rao N. S., Bhavya Kallapu., Surendra Shetty, Muhammad Aslam and Syeda Fizzah Jilani    
The advancements in communication speeds have enabled the centralized financial market to be faster and more complex than ever. The speed of the order execution has become exponentially faster when compared to the early days of electronic markets. Though... ver más
Revista: Information

 
Ibrahim Shawky Farahat, Waleed Aladrousy, Mohamed Elhoseny, Samir Elmougy and Ahmed Elsaid Tolba    
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets. Thus, in this pa... ver más
Revista: Information

 
Fumin Zou, Chenxi Xia, Feng Guo, Xinjian Cai, Qiqin Cai, Guanghao Luo and Ting Ye    
Due to the challenge of limited line of sight in the perception system of intelligent driving vehicles (cameras, radar, body sensors, etc.), which can only perceive threats within a limited range, potential threats outside the line of sight cannot be fed... ver más
Revista: Applied Sciences