Analysis of Document Management Systems Electronic Secret News

Peni Arsih

Abstract


The process of news administration from the ranks in the area, entered through a fax machine coded in the password room which was then distributed to the destination work unit by courier / caraka. To ensure the confidentiality of news documents, an encryption process is performed using the Blowfish algorithm, this algorithm is chosen because it has the fastest form of other block cipher algorithms (Salama, Elminaam, Mohamed, Kader, & Hadhoud, 2010). Then to guarantee the integrity of the archive, the Whirlpool hash function is used, this algorithm is able to produce hash values that have an output length of 512 bits but with a faster time than the NIST recommendation algorithm, SHA-512 (Cryptopp, 2009), besides Whirlpool is a standard hash function ISO / IEC 10118-3: 2003. For the legalization process and ensuring the authenticity of the news can be fulfilled by the RSA Digital Signature algorithm, the algorithm is chosen because it complies with the NIST FIPS 186-4 standard. The news management application that will be designed is also adjusted to the minimum electronic system requirements in accordance with Law Number 11 of 2008, which can protect the integrity, authenticity, confidentiality and accessibility of electronic information. This research will produce an application that is capable of managing web-based electronic confidential news documents. The application can also guarantee the confidentiality, integrity, and authenticity of managed news documents. It is expected that with this application, it can meet management needs


Keywords


analys System, System Document, Managemennt, Electronic, Sercret

References


Kadir, A. (2003). Konsep & Tuntunan Praktis Basis Data. Yogyakarta: Andi.

Semiawan, C. R. (2010). Metode Penelitian Kualitatif. Jakarta: Gramedia. Sommerville, I. (2011). Software Engineering (9 th). Boston: Pearson Education,Inc.

Cryptopp. (2009). Cryptographic Algorithm Speed Benchmark. Retrieved January 1, 2015, from http://www.cryptopp.com/benchmarks.html

Creswell, J. W. (2010). Research Design- Qualitative, Quantitative, and Mixed Methods Approaches.pdf. California: Sage Publications.

Kendall, K. E., & Kendall, J. E. (2011). System Analysis and Design (8 th). New Jersey: Pearson Education, Inc.

Dennis, A., Wixom, B. H., & Tegarden, D. (2009). Systems Analysis and Design with UML Verison 2.0 (3rd ed.). John Wiley & Sons, Inc.

Wimpertiwi, D., Sasongko, A. H., & Kurniawan, A. (2014). Konsep Business Process Reenngineering untuk Memperbaiki Kinerja Bisnis Menjadi Lebih Baik : Studi Kasus Perusahaan Susu Kedelai “XYZ,” 5(2), 658–668.

Wintolo, H., Retnowati, N. D., & Fendriyanto, P. (2013, December).Penerapan Alogritma Lipat Pada Steganografi Yang Memanfaatkan RMS (Record Management System) Di J2ME. In Conference SENATIK STT Adisutjipto Yogyakarta (Vol. 1, p. 76).




DOI: http://dx.doi.org/10.28989/senatik.v4i0.219

Article Metrics

Abstract view : 20 times

Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Conference SENATIK P-ISSN :2337-3881 and  E-ISSN : 2528-1666