Data Security Using Encrypted Email at The Air Force Academy

  • Muhammad Fahrurozi AAU
  • Mavel Ridho Teknik Elektronika Pertahanan, Akademi Angkatan Udara
  • Setiyono Setiyono Teknik Elektronika Pertahanan, Akademi Angkatan Udara

Abstract

Confidentiality of information and communication to protect sensitive data is an absolute thing and must be fulfilled when this will not exist in the military world. Confidentiality of data in exchanging information will protect institutions from unwanted things. As a military educational institution, the Air Force Academy requires a data security system to guarantee an institution. In securing data, confidentiality and security remain, namely confidentiality, integrity and availability so that the information content is maintained. The rapid development of data security tools, one of which uses the Pretty Good Privacy method. This system uses yahoo RSA cryptographic techniques to protect data sent via email. Several AAU work units that use the PGP method in carrying out e-mail data exchange are the financial unit, the health unit and the personnel unit that manages human resources. This PGP method can protect data or information on email. This technique is expected to be the first step in data security at the Air Force Academy

Downloads

Download data is not yet available.

References

A. Nitaj, “The Mathematical Cryptography of the RSA Cryptosystem,” p. 31.

R. A. Azdy, “Tanda tangan Digital Menggunakan Algoritme Keccak dan RSA,” J. Nas. Tek. Elektro Dan Teknol. Inf., vol. 5, no. 3, Art. no. 3, 2016.

K. Om, “Secure email gateway,” in 2017 IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), Chennai, India, Aug. 2017, pp. 49–53. doi: 10.1109/ICSTM.2017.8089126.

“Kaspersky spam and phishing report for 2021.” https://securelist.com/spam-and-phishing-in-2021/105713/ (accessed Oct. 16, 2022).

B. Rahardjo, “Keamanan Informasi,” p. 47.

R. I. Ananda, Fauziah, and N. Hayati, “KEAMANAN EMAIL MENGGUNAKAN METODE PRETTY GOOD PRIVACY DENGAN ALGORITMA RSA,” J. Ilm. Inform. Komput., vol. 25, no. 3, pp. 213–224, 2020, doi: 10.35760/ik.2020.v25i3.3118.

R. Munir, “Pengantar Kriptografi,” p. 68.

B. Rahardjo, “Keamanan Perangkat Lunak,” p. 39.

A. Tanoto, “Analisis Keamanan pada Pretty Good Privacy (PGP),” p. 15.

N. Iriadi, “ANALISIS KEAMANAN E-MAIL MENGGUNAKAN PRETTY GOOD PRIVACY,” Paradigma, vol. 13, no. 1, Art. no. 1, 2011, doi: 10.31294/p.v13i1.3422.

A. R. Fauzi, “MONITORING JARINGAN WIRELESS TERHADAP SERANGAN PACKET SNIFFING DENGAN MENGGUNAKAN IDS,” vol. 8, p. 7, 2018.

E. Budi, D. Wira, and A. Infantono, “Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0,” Pros. Semin. Nas. Sains Teknol. Dan Inov. Indones. SENASTINDO, vol. 3, pp. 223–234, Dec. 2021, doi: 10.54706/senastindo.v3.2021.141.

Published
2022-10-31
How to Cite
Fahrurozi, M., Ridho, M., & Setiyono, S. (2022). Data Security Using Encrypted Email at The Air Force Academy. Prosiding Seminar Nasional Sains Teknologi Dan Inovasi Indonesia (SENASTINDO), 4, 1-10. https://doi.org/10.54706/senastindo.v4.2022.182

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.