2019
DOI: 10.53513/jis.v18i2.155
|View full text |Cite
|
Sign up to set email alerts
|

Implementasi DES (Data Encryption Standard) Untuk Penyandian Data Bill Of Material pada Divisi Produksi PT.Siantar Top, Tbk

Abstract: Bill of Material (BOM) memuat data komposisi produk dan juga takaran dalam proses produksi, data ini bisa juga disebut seperti resep. Data ini merupakan salah satu aspek terpenting karena menyangkut rasa dan kualitas produk. Pentingnya data BOM ini biasanya menjadi sasaran bagi para pesaing dunia usaha untuk disalin dan dapat menghasilkan produk sama baiknya ataupun lebih baik lagi. Untuk keamanan data BOM selama ini adalah dengan membatasi akses  beberapa  pengguna  dan  hanya pengguna yang berkepentingan saj… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
0
0
Order By: Relevance
“…From the results of the literature review, all algorithms have their own uniqueness with different applications and have their own advantages and disadvantages. Several applications are using DES that can work in existing applications, both to secure student grades [15], hide PDF files [18], secure data in companies [19], change messages by 50% [20], able to secure guest data [21], able to be implemented on IoT devices [22], able to secure exhaustive attacks and cryptanalysis attacks [27], can produce high avalanche effect [28], can be applied to IoT [30], can secure accounting data with sensitivity between 5 and 6. 6 [31] [32].…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…From the results of the literature review, all algorithms have their own uniqueness with different applications and have their own advantages and disadvantages. Several applications are using DES that can work in existing applications, both to secure student grades [15], hide PDF files [18], secure data in companies [19], change messages by 50% [20], able to secure guest data [21], able to be implemented on IoT devices [22], able to secure exhaustive attacks and cryptanalysis attacks [27], can produce high avalanche effect [28], can be applied to IoT [30], can secure accounting data with sensitivity between 5 and 6. 6 [31] [32].…”
Section: Analysis and Discussionmentioning
confidence: 99%