Pengamanan File Audio Menggunakan Algoritma Kriptografi Blowfish Dan Pengujian UAT
Keywords:
audio file security, blowfish cryptography, UAT testing.Abstract
The current problem at PT. Central Asia Insurance is data or information from meeting recordings that have been made without security so that the resulting data is leaked and can be published by unauthorized persons. This study aims to secure the results of the meeting in the form of audio that will be sent to the branch of PT. Central Asia Insurance using blowfish cryptographic algorithm and UAT testing. Therefore, I created an encryption application to secure the audio from the meeting at PT. Central Asia Insurance. The goal is to prevent irresponsible people from being able to know the results of the meeting directly because the Audio file has been encrypted. By making this application, it can guarantee the audio file of the meeting at PT. Central Asia insurance can be accepted by people who are entitled and have keys. The final result of this research is that this application is able to encrypt audio files with a maximum data size of 120 Mb. Based on trials carried out as many as 15 encrypted files, the encrypted file size becomes large with an average value of 12,009,507 bytes and an average encryption process time of 37.0 seconds while the decryption time is 52.2 seconds. So that the files obtained can be protected and can only be accessed by users who have a password lock. In the UAT test, a questionnaire with a Likert scale scale of 5. has been used. As a result, the respondents agree (above 91.23%) that the overall application of the blowfish algorithm to secure data files can be kept confidential.
References
Chandra S. P., Banni S. A., 2016, Sistem Informasi Manajemen Pengarsipan Dengan Menggunakan Algoritma Blowfish , Jurnal Informatika Polinema, ISSN: 2407-070X, Volume 2, Edisi 2, Februari 2016, pp.50-54. DOI: https://doi.org/10.33795/jip.v2i2.55 .
Novrido C., Fitrianty dan Bambang Y. 2016, Aplikasi Enkripsi Pengiriman file Suara Menggunakan Algoritma Blowfish, Seminar Nasional Informatika 2011 (semnasIF 2011), ISSN: 1979-2328, UPN ”Veteran” Yogyakarta, 2 Juli 2011, pp. E-201 – E-207, Tersedia di: http://jurnal.upnyk.ac.id/index.php/semnasif/article/view/1298/1172, [Accessed tanggal 12 Juli 2021].
Aldo Adrian et al. 2017, Pengembangan Aplikasi Pengaman Berkas Menggunakan Algoritma Blowfish, Jurnal Sisfo Vol. 07 No. 01, pp. 15–26, doi:
https://doi.org/10.24089/j.sisfo.2017.09.002
Endang C. P., 2017. Pengujian UAT (User Acceptance Test). Tersedia di: https://endangcahyapermana.wordpress.com/2017/03/14/pengujian-uat-user-acceptance-test/, [Accessed 12 Maret 2021].
C. S. Theng, 2017. “Leisure Technology for the Elderly?: A Survey , User Acceptance Testing and Conceptual Design,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 12, pp. 100–115, 2017.
Danang W. U., Defri K. dan Yani P. A.. 2018. Teknik Pengujian Perangkat Lunak Dalam Evaluasi Sistem Layanan Mandiri Pemantauan Haji Pada Kementerian Agama Provinsi Jawa Tengah. Jurnal SIMETRIS, Vol. 9 No. 2 November 2018, P-ISSN: 2252-4983, E-ISSN: 2549-3108, pp.731–746.
Hendri M., Basorudin, 2017, Analisis Algoritma Blowfish Pada Proses Enkripsi Dan Dekripsi File, Riau Journal of Computer Science Vol. 3 No. 2, eISSN 2477-6890, pISSN 2460-0679, pp. 156-168, doi: https://doi.org/10.30606/rjocs.v3i2.1348.
Muhathir, 2018, Perbandingan Algoritma Blowfish Dan Twofish Untuk Kriptografi File Gambar, JITE, 2 (1) Juli 2018, ISSN 2549-6255 (Print), ISSN 2549-6247 (Online), pp. 23-32, Tersedia di: https://ojs.uma.ac.id/index.php/jite/article/view/1673/1601, [Accessed 13 Maret 2021].
Ibrahim M. S., Anggi P. S. dan Wawan G., 2019, Aplikasi Enkripsi dan Dekripsi untuk Keamanan Komunikasi Data pada SMS (Short Message Service) Berbasis Android Menggunakan Algoritma Blowfish, Jurnal FORMAT, Volume 8, Nomor 1, Tahun 2019, ISSN : 2089–5615 , pp. 34-41, Tersedia di: https://publikasi.mercubuana.ac.id/index.php/format/article/view/5716/2761, [Accessed 15 Maret 2021].
Dimas A. T. dan Herlina L. S., 2016, Analisis Perbandingan Kinerja Algoritma Blowfish Dan Algoritma Twofish Pada Proses Enkripsi Dan Dekripsi, ,Jurnal Pseudocode, Volume 2 Nomor 1, Februari 2015, ISSN 2355 – 5920, pp. 37-44, Tersedia di: https://ejournal.unib.ac.id/index.php/pseudocode/article/view/424/368, [Accessed 15 Maret 2021], DOI: https://doi.org/10.33369/pseudocode.2.1.37-44,
Siswo W., Zaldi I, Rian F, Enkripsi Dan Dekripsi File Dengan Algoritma Blowfish Pada Perangkat Mobile Berbasis Android, Jurnal Nasional Teknik Elektro, Vol: 5, No. 1, Maret 2016, ISSN: 2302 – 2949, pp. 36-44, Tersedia di: http://jnte.ft.unand.ac.id/index.php/jnte/article/view/199/209, [Accessed 25 Maret 2021], DOI : 10.20449/jnte.v5i1.199.2016..
Mujito, Anugrah, 2016. Aplikasi Kriptografi File Menggunakan Metode Blowfish dan Metode Base64 pada Dinas Kependudukan dan Pencatatan Sipil Kota Tangerang Selatan, Jurnal SISFOKOM, Volume 05, Nomor 01, September 2016, pp. 54-60, Tersedia di: http://jurnal.atmaluhur.ac.id/index.php/sisfokom/article/view/39/511, [Accessed 25 Maret 2021], DOI: https://doi.org/10.32736/sisfokom.v5i2.39.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Hak cipta artikel milik penulis.
This work is licensed under a Creative Commons Attribution 4.0 International License.
http://creativecommons.org/licenses/by/4.0