MULTILEVEL ENCRYPTION USING A COMBINATION OF BASE64 AND PEPPER CRYPTOGRAPHY ALGORITHM

  • Muhammad Najibulloh Muzaki Universitas Nusantara PGRI Kediri
  • Rina Firliana Universitas Nusantara PGRI Kediri
  • Rini Indriati Universitas Nusantara PGRI Kediri
  • Anita Sari Wardani Universitas Nusantara PGRI Kediri
  • Erna Daniati Universitas Nusantara PGRI Kediri
Abstract views: 41 , PDF downloads: 33

Abstract

Data exchange over the internet is susceptible to security issues. Efforts to secure the system are carried out using various methods. One method used is to encrypt data. This research uses a combination of Base64 and Pepper encryption methods. The Base64 algorithm is a two-way hashing algorithm which is used to encrypt and decrypt data. The Pepper algorithm is used to insert several characters into the data. The combination of the two algorithms uses multilevel techniques. From the test results it can be seen that the application of the combination of the Base64 and Pepper algorithms provides more complex encryption results when compared to the results from the pure Base64 algorithm.  because it produces unrecognizable characters.

References

[1] M. I. Suri and A. S. Puspaningrum, “SISTEM INFORMASI MANAJEMEN BERITA BERBASIS WEB,” Jurnal Teknologi dan Sistem Informasi, vol. 1, no. 1, pp. 8–14, Jun. 2020, doi: 10.33365/jtsi.v1i1.128.
[2] E. Setyawati, C. E. Widjayanti, R. R. Siraiz, and H. Wijoyo, “Pengujian keamanan komputer kriptografi pada surat elektronik berbasis website dengan enkripsi metode MD5,” Jurnal Manajamen Informatika Jayakarta, vol. 1, no. 1, p. 56, Feb. 2021, doi: 10.52362/jmijayakarta.v1i1.367.
[3] S. Nurul, S. Anggrainy, and S. Aprelyani, “Faktor-Faktor Yang Mempengaruhi Keamanan Sistem Informasi: Keamanan Informasi, Teknologi Informasi Dan Network (Literature Review SIM),” Jurnal Ekonomi Manajemen Sistem Informasi, vol. 3, no. 5, pp. 564–573, 2022.
[4] A. Adil Yazdeen, S. R. M. Zeebaree, M. Mohammed Sadeeq, S. F. Kak, O. M. Ahmed, and R. R. Zebari, “FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review,” Qubahan Academic Journal, vol. 1, no. 2 SE-Articles, pp. 8–16, Mar. 2021, doi: 10.48161/qaj.v1n2a38.
[5] M. H. Saracevic et al., “Data Encryption for Internet of Things Applications Based on Catalan Objects and Two Combinatorial Structures,” IEEE Transactions on Reliability, vol. 70, no. 2, pp. 819–830, 2021, doi: 10.1109/TR.2020.3010973.
[6] H. Pasaribu, M. F. Harahap, U. P. Indonesia, and S. Seikambing, “Perancangan Aplikasi Hashing File Menggunakan Sha – 224 Berbasis Android,” Jurnal Mantik Penusa, vol. 4, no. 1, pp. 19–26, 2020.
[7] R. Andriyanto, K. Khairijal, and D. Satria, “Penerapan Kriptografi AES Class Untuk Pengamanan URL WEBSITE Dari Serangan SQL INJECTION,” JURNAL UNITEK, vol. 13, no. 1, pp. 34–48, 2020, doi: 10.52072/unitek.v13i1.153.
[8] R. Minarni, “Implementasi Algoritma Base64 untuk Mengamakan SMS pada Smartphone,” Building Informatics, Technology and Science (BITS), vol. 1, no. 1, pp. 28–33, 2019.
[9] Y. Zhang et al., “Information stored in nanoscale: Encoding data in a single DNA strand with Base64,” Nano Today, vol. 33, 2020, doi: 10.1016/j.nantod.2020.100871.
[10] S. Supiyandi, H. Hermansyah, and K. A. P. Sembiring, “Implementasi dan Penggunaan Algoritma Base64 dalam Pengamanan File Video,” JURNAL MEDIA INFORMATIKA BUDIDARMA, vol. 4, no. 2, p. 340, Apr. 2020, doi: 10.30865/mib.v4i2.2042.
[11] A. Kodir and W. Pramusinto, “IMPLEMENTASI KRIPTOGRAFI DENGAN MENGGUNAKAN METODE RC4 DAN BASE64 UNTUK MENGAMANKAN DATABASE SEKOLAH PADA SDN GROGOL UTARA 10,” SKANIKA, vol. 4, no. 1, pp. 7–14, Jan. 2021, doi: 10.36080/skanika.v4i1.884.
[12] A. S. Manullang, R. Puspasari, and W. Verina, “Penyandian Database Menggunakan Metode Base64 Dan Rot13 Database Encoding Using Base64 and ROT13 Methods,” Jurnal FTIK, vol. 1, no. 1, pp. 283–292, 2020.
[13] C. Wadisman, I. Nozomi, and S. Rahmawati, “PENGAMANAN DATABASE MENGGUNAKAN KOMBINASI ALGORITMA (CEST CRYPTOGRAPHY) DAN ALGORiTMA BASE64,” JURTEKSI (Jurnal Teknologi dan Sistem Informasi), vol. 7, no. 1, pp. 33–38, 2020, doi: 10.33330/jurteksi.v7i1.896.
[14] S. W. Jeon, K. S. Kwack, J. S. Yun, S. M. Gho, and S. Park, “Salt-and-pepper noise sign on fat-fraction maps by chemical-shift–encoded MRI: A useful sign to differentiate bone islands from osteoblastic metastases—a preliminary study,” American Journal of Roentgenology, vol. 214, no. 5, pp. 1139–1145, 2020, doi: 10.2214/AJR.19.22177.
[15] P. Bunga, S. Pella, and M. Odja, “Implementasi Secret Sharing Berbasis Kriptografi Visual Skema (k, n) Pada Citra Biner Menggunakan GUI Matlab,” TRANSISTOR Elektro dan Informatika, vol. 5, no. 1, 2023.

PlumX Metrics

Published
2025-03-25
How to Cite
Muhammad Najibulloh Muzaki, Rina Firliana, Rini Indriati, Anita Sari Wardani, & Erna Daniati. (2025). MULTILEVEL ENCRYPTION USING A COMBINATION OF BASE64 AND PEPPER CRYPTOGRAPHY ALGORITHM. Jurnal Qua Teknika, 15(01), 14-24. https://doi.org/10.35457/quateknika.v15i01.4364