Harlen Gilbert Simanullang, Arina Prima Silalahi


The limitations of humans to maintain the security and confidentiality of stored data can have a bad impact if it is used by unauthorized parties. One way to secure shipping is to convert data into one that is not understood by encoding and insertion using cryptographic techniques. Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is a modern cryptographic algorithm symmetrical key shaped block cipher. The Blowfish algorithm is quite simple but strong enough because it has a long key space, making it difficult to attack. Encryption is done by using a certain key, so as to produce ciphertext (files that have been encrypted or encoded) that cannot be read or understood. The ciphertext can be restored as if it was decrypted using the same key when encrypting the file. The key length used can affect the security of the algorithm. The decryption flow is almost the same as the Blowfish Algorithm encryption, except in the P-array (P1, P2, …… .., P18) done by invading. Information of a system is certainly stored in a database that is always possible to attack, but using cryptography then the problem can be overcome. By using the Blowfish algorithm, information security in a MySQL database can be improved.

Keywords: Cryptography, Blowfish Algorithm, Block Cipher, Ciphertext, Encryption, Decryption, MySQL

Teks Lengkap:

Tidak berjudul (English)


Ariyus, Dony. 2007. Intrusion Detection System. Yogyakarta : Penerbit Andi

Christina L, Joe Irudayaraj V S,Optimized Blowfish Encryption Technique, International Journal of Innovative Research in Computerand Communication Engineering

E.A.Shanty, Implementasi Algoritma Kriptografi Blowfish Untuk Keamanan Dokumen Pada Microsoft Office, J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689– 1699, 2013.

Kadir,Abdul. 2009. Mudah mempelajari database MySQL. Andi, Yogyakarta

Munir, R., 2006. Kriptografi, Bandung: Informatika

Pratama, I Putu. 2014. Sistem Informasi dan Implementasinya. Bandung: Informatika

Sadikin, Rifki. 2012. Kriptografi untuk Jaringan. Yogyakarta: Andi Publisher

Sitinjak, Suriski. Fauziah, Yuli. Juwairiah. 2010. Aplikasi Kriptografi File Menggunakan Algoritma Blowfish. Jurnal SemnasIf:78-86.

Sutanto, Candra. 2009. Penggunaan Algoritma Blowfish dalam Kriptografi. Institut Teknologi Bandung, ISSN: 2320-9801 , Vol. 2, Issue 7, July 2014.

Tanjyot Aurora, Parul Arora, "Blowfish Algorithm”, IJCSCE, ISSN 2319-7080,NCRAET , 2013.


  • Saat ini tidak ada refbacks.