Implementasi Kriptografi Metode Elgamal Untuk Keamanan Data Teks
Abstract
The development of technology and information today greatly affects data security and privacy. Data, which includes facts or details about an event, can be in various forms and requires reliable management. Cryptography is the main solution to securing information, which involves two main processes: encryption and decryption. The ElGamal method, an asymmetric cryptography algorithm, uses a pair of public and private keys, increasing data security without sharing the secret key. ElGamal's strength lies in the Discrete Logarithm Problem, which provides resistance to brute force attacks. It can also be used for digital signatures, ensuring the authenticity and integrity of dataThe implementation results concluded that ElGamal effectively secures text data by encrypting it into a sequence of unrepresentative characters. This implementation provides an additional layer of security by making the encrypted data unconnected to the original information
Downloads
References
[2] Ayumida, S., Azis, M. S., & Fiano, Z. G. (2020). Implementasi Program Administrasi Pembayaran Berbasis Dekstop (Studi Kasus: SMA Negeri 1 Cikampek). Jurnal Interkom: Jurnal Publikasi Ilmiah Bidang Teknologi Informasi dan Komunikasi, 72-83.
[3] Dairi, M., Asih, M. S., & Khairunnisa. (2023). Implementasi Algoritma Kriptografi RSA Dalam Aplikasi Sistem Informasi Perpustakaaan. Jurnal Ilmu Komputer dan Sistem Informasi (JIRSI) , 214-223.
[4] Ekta , N., Christian, A., & Wijaya, K. (2021). Implementasi Metode (User Centered Design) PadaRancang Bangun Sistem Informasi Perpustakaan : Studi Kasus : SMK Negeri 1 Gelumbang. Jurnal Pengembangan Sistem Informasi dan Informatika, 69-77.
[5] Fauzi, R. (2024). Implementasi Algoritma Kriptografi Elgamal Untuk Pesan Rahasia Berbasis Web Di Markas Pmi Kota Tangerang. Jurnal Ilmu Komputer (JIK), 50-54.
[6] Hasan, H. I., & Safrizal, S. (2024). Penerapan Algoritma Affine Cipher Untuk Keamanan Data Registrasi Siswa Baru. Seminar Nasional Multi Disiplin Ilmu (SENADIMU), 1029-1042.
[7] Limantoro, R. R., & Kristiadi, D. P. (2021). Pengembangan Sistem Informasi Pendataan Green Folder Menggunakan Metode Berorientasi Objek Dan UML Berbasis Web Pada TKHarvest Christian School. JURNAL SISTEM INFORMASI DAN TEKNOLOG (SINTEK), 7-14.
[8] Muafi, Wijaya, A., & Aziz, V. A. (2020). Sistem Pakar Mendiagnosa Penyakit Mata Pada Anusia Menggunakan Metode Forward Chaining. Jurnal Komputasi dan Teknologi Informasi, 43-49.
[9] Nugraha, S. N. (2024). Penerapan Algoritma Kriptografi Elgamal Pada Aplikasi Pengamanan Pesan Berbasis Website. JITET (urnal Informatika dan Teknik Elektro Terapan), 2513-2524.
[10] Ridho, A., Mutia, C., & Sinaga, A. P. (2022). Analisis Enkripsi Dan Dekripsi Cipher Teks Menggunakan Kombinasi Gronsfeld Cipher Dengan Reverse Cipher. JTIK (Jurnal Teknik Informatika Kaputam), 87-94.
[11] Samsudin, A., & Islami, H. H. (2023). Sistem Pengaduan Masyarakat Menggunakan Metode Agile Extreme Programming. Jurnal Infotex, 214-226.
[12] Sasono, D. M., Tahir, M., Angel M, F., Azizah, M., Utami, L. F., & Septiana, N. (2023). Perbandingan Kriptography Klasik Caesar Cipher Dengan Kriptography Modern Aes Dalam Tingkat Keamanan Jaringan Kompute. Jurnal Informasi, Sains dan Teknologi, 72-77.
[13] Siagian, K. Z., & Triandi, B. (2024). Implementasi Aplikasi KeamananData Karyawan Pada PT. Jaya Diesel Menggunakan Metode Affine Chiper Dan Rsa Berbasis Web. Jurna l Info Digit (JDI), 672-683.
[14] Silalah, L., & Sindar, A. (2020). Penerapan Kriptografi Keamanan Data Administrasi Kependudukan Desa Pagar Jati Menggunakan SHA-1. Jurnal Nasional Komputasi dan Teknologi Informasi, 182-186.
[15] Sutrisno, J., & Karnadi, V. (2021). Aplikasi Pendukung Pembelajaran Bahasa Inggris Menggunakan Media Lagu Berbasis Android. JURNAL COMASIE, 31-41.
[16] Wahidin, U., Sarbini, M., Maulida, A., & Wangsadanureja, M. (2021). Implementasi Pembelajaran Agama Islam Berbasis Multimedia Di Pondok Pesantren. Edukasi Islami: Jurnal Pendidikan Islam, 21-32.
Copyright (c) 2025 Muhamad Akbar, Indra Kanedi; Ockhy Jey Fhiter.W

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
An author who publishes in Jurnal Media Infotama agrees to the following terms:The author holds the copyright and grants the journal the right of first publication of the work simultaneously licensed under the Creative Commons Attribution-Share Alike 4.0 License which allows others to share the work with acknowledgment of the work's authorship and initial publication in this journal.Submission of a manuscript implies that the submitted work has not been previously published (except as part of a thesis or report, or abstract); that it is not being considered for publication elsewhere; that its publication has been approved by all co-authors. If and when a manuscript is accepted for publication, the author retains the copyright and retains the publishing rights without limitation.
For new inventions, authors are advised to administer the patent before publication. The license type is CC-BY-SA 4.0.
MEDIA INFORMATION REVIEW: Journal of the Faculty of Computer Science is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.You are free to:Share
— copy and redistribute material in any medium or formatAdapt
— remix, modify and develop materialfor any purpose, even commercial.
The licensor cannot revoke this freedom as long as you follow the license terms