Data Security Using Encrypted Email at The Air Force Academy
DOI:
https://doi.org/10.54706/senastindo.v4.2022.182Keywords:
AAU, email, informasi, keamanan data, PGPAbstract
Confidentiality of information and communication to protect sensitive data is an absolute thing and must be fulfilled when this will not exist in the military world. Confidentiality of data in exchanging information will protect institutions from unwanted things. As a military educational institution, the Air Force Academy requires a data security system to guarantee an institution. In securing data, confidentiality and security remain, namely confidentiality, integrity and availability so that the information content is maintained. The rapid development of data security tools, one of which uses the Pretty Good Privacy method. This system uses yahoo RSA cryptographic techniques to protect data sent via email. Several AAU work units that use the PGP method in carrying out e-mail data exchange are the financial unit, the health unit and the personnel unit that manages human resources. This PGP method can protect data or information on email. This technique is expected to be the first step in data security at the Air Force Academy
Downloads
References
A. Nitaj, “The Mathematical Cryptography of the RSA Cryptosystem,” p. 31.
R. A. Azdy, “Tanda tangan Digital Menggunakan Algoritme Keccak dan RSA,” J. Nas. Tek. Elektro Dan Teknol. Inf., vol. 5, no. 3, Art. no. 3, 2016.
K. Om, “Secure email gateway,” in 2017 IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), Chennai, India, Aug. 2017, pp. 49–53. doi: 10.1109/ICSTM.2017.8089126.
“Kaspersky spam and phishing report for 2021.” https://securelist.com/spam-and-phishing-in-2021/105713/ (accessed Oct. 16, 2022).
B. Rahardjo, “Keamanan Informasi,” p. 47.
R. I. Ananda, Fauziah, and N. Hayati, “KEAMANAN EMAIL MENGGUNAKAN METODE PRETTY GOOD PRIVACY DENGAN ALGORITMA RSA,” J. Ilm. Inform. Komput., vol. 25, no. 3, pp. 213–224, 2020, doi: 10.35760/ik.2020.v25i3.3118.
R. Munir, “Pengantar Kriptografi,” p. 68.
B. Rahardjo, “Keamanan Perangkat Lunak,” p. 39.
A. Tanoto, “Analisis Keamanan pada Pretty Good Privacy (PGP),” p. 15.
N. Iriadi, “ANALISIS KEAMANAN E-MAIL MENGGUNAKAN PRETTY GOOD PRIVACY,” Paradigma, vol. 13, no. 1, Art. no. 1, 2011, doi: 10.31294/p.v13i1.3422.
A. R. Fauzi, “MONITORING JARINGAN WIRELESS TERHADAP SERANGAN PACKET SNIFFING DENGAN MENGGUNAKAN IDS,” vol. 8, p. 7, 2018.
E. Budi, D. Wira, and A. Infantono, “Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0,” Pros. Semin. Nas. Sains Teknol. Dan Inov. Indones. SENASTINDO, vol. 3, pp. 223–234, Dec. 2021, doi: 10.54706/senastindo.v3.2021.141.