• Pratiwi Pratiwi
  • Dwi Atmodjo WP
Keywords: data security, encryption method, pseudorandom modification sequence


Security on data by owned becoming a need and necessity that is very important in all aspects of social life. Security of data and information is a key factor that determines whether the data forefront of the information is still useful and can be used. In the banking world a lot of customer data that must be protected and carefully considered the safety factor like e-banking, sms banking, internet banking, etc. One of the ways to improve data security is with cryptography. This cryptographic technique used to perform the encryption and decryption of data, convert or transform data into a code specific code. This study aims to improve data security level with Pseudorandom Modification Sequence. This algorithm was more safety because it couldn’t be read by anyone except by those who are entitled. The advantage of this encryption technique that uses encryption algorithm is very light but safe in the sense that the results of the encryption can hide the original data into a form that is difficult to translate. The results achieved with this algorithm obtained an accuracy of above 95% to returns to the initial form.


[1] E. Yosafat Prasetyo, “Aplikasi Teori Bilangan di Dalam Masalah Kriptogtafi (Yosafat Eka Prasetyo Pangalela).” Informatika STEI ITB, 2010.
[2] S. Tjiharjadi and M. W. Chandra, “Pengamanan Data Dengan Menggunakan Algoritma Stream Cipher Seal,” Konf. Nas. Sist. Dan Inform. 2009, Nov. 2009.
[3] R. Mahyudin, “Algoritma Message Digest 5 (MD5) Dalam Aplikasi Kriptografi.” 2006.
[4] A. Sofwan and A. Budi, “Aplikasi Kriptografi Dengan Algoritma Message Diggest 5 (MD5).” Universitas Diponegoro Semarang, 2006.
[5] E. Rahmawati Agustina and A. Kurniati, “Pemanfaatan Kriptografi dalam Mewujudkan Keamanan Informasi Pada e-Voting di Indonesia,” Semin. Nas. Inform. 2009 UPN Yogyak., Mei 2009.
[6] T. Puji Rahayu, Yakub, and I. Limiady, “Aplikasi Enkripsi Pesan Teks (Sms) Pada Perangkat Handphone Dengan Algoritma Caesar Cipher.” SENTIKA 2012, 10-Mar-2012.