Penerapan Algoritma Rivest Shamir Adleman Untuk Meningkatkan Keamanan Virtual Private Network

Adiat Pariddudin - [ https://orcid.org/0000-0003-3333-3744 ]
Muhammad Syawaludin

Abstract

Data and information security of an organization or company is very important. Data in an organization or company has important information for the sustainability of a company, as well as PT Karya Gemilang Plasindo. In order to increase the productivity and speed of information data, a VPN (Virtual Private Network) technology was built to connect the branch company and some employees who work on a mobility. But in practice there is a gap in the VPN (Virtual Private Network) technology used, the management of devices and users is irregular because the connecting process is only a username and password. The solution is to increase security in VPN (Virtual Private Network) technology by changing the VPN (Virtual Private Network) protocol and adding a certificate to limit devices that can connect to the intranet network. Previously, VPN (Virtual Private Network) technology used the PPTP (Point-to-Point Tunneling Protocol) protocol. These deficiencies are solved by changing the protocol to SSTP (Secure Socket Tunneling Protocol) and creating a certificate as the identity of a device while limiting the devices that can connect to the intranet network. The design in this study used RnD (Research and Development) and the results were tested using the Validity Test and Reliability Test with the KR 20 technique (Kuder Richardson). This test is tested using a questionnaire about the level of security of the latest technology to users. The test results to be achieved are the increased security of VPN (Virtual Private Network) on the designed intranet network that is considered to be able to maintain data and information security at PT Karya Gemilang Plasindo

Keywords

RSA; PPTP; VPN; RnD; Protocol.

References

Ahmad Budi Setiawan. 2015. Ekosistem Penyelenggaraan Sertifikat Elektronik Dalam Sistem Perdagangan Elektronik, Vol.6, No.2, Puslitbang Aplikasi Informatika dan Informasi Komunikasi, hal 15-27.

Ahmad, Amar. 2012. Perkembangan Teknologi Komunikasi dan Informasi: Akar Revolusi dan Berbagai Standarnya, Jurnal Dakwah Tabligh, Vol.13, No.1, Universitas Indonesia Jakarta, hal 137-149.

Arikunto, Suharsimi. 1998. Prosedur Penelitian, Rineka Cipta, Jakarta.

Guilford, J.P. 1956. Fundamental Statistic in Psychology and Education. McGraw-Hill Book Company, Inc. New York.

Harbani, Arif, and Muhamad A. Fahreza. "Aplikasi Keamanan Data Gambar Menggunakan Algoritma RSA (Rivest Shamir Adleman) Berbasis Desktop." Teknois, vol. 9, no. 1, May. 2019, pp. 1-9, doi:10.36350/jbs.v9i1.1.

Nasution. 2009. Metode Research (Penelitian Ilmiah). Bumi Aksara. Jakarta.

Sahari. 2008. Perancangan dan Implementasi Virtual Private Network (VPN) Pada Jaringan Nirkabel, Poli Rekayasa, Vol.4, No.1, UPI-YPTK Padang, hal 48-55.

Singarimbun, Masri & Effendi, Sofian. 1999. Metode Penelitian Survay. PT Pustaka LP3ES Indonesia. Jakarta.

Sugiyono. 2009. Metode Penelitian Kualitatif, Alfabeta, Bandung.

Sugiyono. 2012. Metode Penelitian Kuantitatif, Kualitatif, dan R & D, Alfabeta, Bandung.

Article metrics

Abstract views : 309 | views : 180

Refbacks

  • There are currently no refbacks.