Implementasi Algoritma Vigenere Cipher Untuk Keamanan Data Bantuan Sosial Di Desa
DOI:
https://doi.org/10.47065/bulletincsr.v5i4.544Keywords:
Algoritma Vigenere Cipher; Data Security; Social Assistance; CryptographyAbstract
Data security in the digital era is very important. Village governments often manage sensitive data related to social assistance, such as recipient names, ID numbers, types of assistance, and other details. This data is very vulnerable to leaks or misuse, especially if there is no strong security system in place. This highlights the importance of implementing technology that supports data security. By implementing cryptographic algorithms such as the Vigenere Cipher, the village government can protect its community's data from potential threats. This algorithm uses a flexible secret key, making it ideal for securing small to medium-scale data, such as social assistance data. The Vigenere Cipher algorithm is applied to secure social assistance data in Lawe Sempilang Village, such as recipient names, ID numbers, and the types of assistance provided. This research aims to develop an application for the Implementation of the Vigenere Cipher Algorithm for Social Assistance Data Security in Lawe Sempilang Village. This application is designed to enhance the security of social assistance data by encrypting the data so that it can only be accessed by authorized parties, thereby preventing data leaks or misuse of information. The research method used is the Research and Development (R&D) method. This research successfully implemented the Vigenere Cipher algorithm in the data management system for social assistance recipients in Lawe Sempilang Village. With the presence of encryption, sensitive information such as Name, NIK, Phone Number, Email, Address, Dependents, and Income remains secure throughout the application process until approval by the Admin Department. The developed system is capable of maintaining data confidentiality and enhancing security in the distribution of social assistance. The results also show that the Vigenere Cipher algorithm succeeded in carrying out the encryption and decryption process correctly, so that only authorized parties can access the information in its original form.
Downloads
References
J. Aisyiah et al., “Penerapan Algoritma Vigenere Cipher Untuk Keamanan Data Peresepan Obat,” J. Inform., vol. 10, no. 1, pp. 1–6, 2023, [Online]. Available: https://ejournal.unibba.ac.id/index.php/computing/article/view/1113
A. P. Kehista et al., “Analisis Keamanan Data Pribadi pada Pengguna E-Commerce: Ancaman, Risiko, Strategi Kemanan (Literature Review),” J. Ilmu Manaj. Terap., vol. 4, no. 5, pp. 625–632, 2023.
Veritas, “Data Risk Assessment,”,7th ed. Boston, MA: Pearson Education, 2023.
N. Safitri, D. Kusnandar, and S. Martha, “Implementasi Algoritma K-Nearest Neighbor Dengan Normalisasi Z-Score Dalam Klasifikasi Penerima Bantuan Sosial Desa Serunai,” Bul. Ilm. Math. Stat. dan Ter., vol. 13, no. 1, pp. 99–106, 2024.
E. Irianti, D. F. Surianto, Ainun Zahra Adistia, Muh. Juharman, and Jumadil Ahmad Safi’i, “Implementasi Kriptografi Vigenere Cipher untuk Keamanan Data Informasi Desa,” Progress. Information, Secur. Comput. Embed. Syst., vol. 1, no. 1, pp. 8–15, 2023, doi: 10.61255/pisces.v1i1.24.
C. Vania, M. Markoni, H. Saragih, and J. Widarto, “Tinjauan Yuridis terhadap Perlindungan Data Pribadi dari Aspek Pengamanan Data dan Keamanan Siber,” J. Multidisiplin Indones., vol. 2, no. 3, pp. 654–666, 2023, doi: 10.58344/jmi.v2i3.157.
Y. Agita, P. Tarigan, R. Aulia, and A. Marwan, “Algoritma AES 128 dalam Mengenkripsikan Berkas Bansos Kecamatan Tigabinanga Berbasis Web,” Jurnal Unitek, vol. 17, no. 2, pp. 2580–2582, 2024, doi: 10.52072/unitek.v17i2.943
N. B. Putra, B. C. Andika, A. D. P. Bagas, and M. Ridwan, “Implementasi sandi vigenere Cipher dalam mengenrkipsi pesan,” Jurnal JOCOTIS, vol. 1, no. 1, pp. 42–50, 2023, Available: https://jurnal.ittc.web.id/index.php/jct/article/view/25/46
J. Kuswanto, A. F. Wulandari, I. Yani, Sheyla Rizky Novanto Samudra, and J. Dapiokta, “Penerapan Metode Weighted Product (WP) untuk Menentukan Penerimaan BLT di Desa Rawasari,” KLIK Kaji. Ilm. Inform. dan Komput., vol. 3, no. 5, pp. 503–508, 2023, [Online]. Available: https://djournals.com/klik
V. M. Hidayah, D. I. Mulyana, and Y. Bachtiar, “Algoritma Caesar Cipher atau Vigenere Cipher pada Pengenkripsian Pesan Teks,” J. Educ., vol. 5, no. 3, pp. 8563–8573, 2023, doi: 10.31004/joe.v5i3.1647.
Rahmad Prayogi Harahap and A. H. Hasugian, “Teknik Keamanan Data Menggunakan Metode Vigenere Cipher Dan Steganografi Dalam Penyisipan Pesan Teks Pada Citra,” J. Fasilkom, vol. 13, no. 3, pp. 570–577, 2023, doi: 10.37859/jf.v13i3.6184.
I. Murni, A. S. Br pa, B. R. Lubis, and A. Ikhwan, “Pengamanan Pesan Rahasia dengan Algoritma Vigenere Cipher Menggunakan PHP,” J. Educ., vol. 5, no. 2, pp. 3466–3476, 2023, doi: 10.31004/joe.v5i2.1027.
S. Azura et al., “Penerapan Kemanan Data Text menggunakan Metode Kriptografi Vigener Chiper Berbasis Web,” Digit. Transform. Technol., vol. 3, no. 1, pp. 20–28, 2023, [Online]. Available: https://doi.org/10.47709/digitech.v3i1.2311
M. Rivaldi, I. Z. Harahap, H. Isdianto, and R. A. Putri, “Implementasi Algoritma Kriptografi Vigenere Cipher Pada Pengamanan Pesan Text Berbasis Web,” POSITIF J. Sist. dan Teknol. Inf., vol. 9, no. 1, pp. 57–61, 2023, doi: 10.31961/positif.v9i1.1611.
K. Fadhli and L. R. Nazila, “Pengaruh Implementasi Bantuan Sosial Bpnt Dan Pkh Terhadap Efektivitas Penanggulangan Kemiskinan,” J. Educ. Dev., vol. 11, no. 2, pp. 196–202, 2023, doi: 10.37081/ed.v11i2.4654.
D. Lase and T. S. Alasi, “Penerapan Web untuk Pengolahan Data Pegawai Kantor Desa Menggunakan Bahasa Pemrograman PHP dan UML,” J. Mahajana Inf., vol. 9, no. 1, pp. 1–6, 2024, doi: 10.51544/jurnalmi.v9i1.5052.
A. F. Silvia, W. Saputra, H. Sunaryo, and F. Sinlae, “Analisis Keamanan Data Pribadi pada Pengguna BPJS Kesehatan: Ancaman, Risiko, Strategi Kemanan (Literature Review),” Nusant. J. Multidiscip. Sci., vol. 2, no. 1, pp. 201–207, 2024, [Online]. Available: https://www.researchgate.net/publication/377361104_Analisis_Keamanan_Data_Pribadi_pada_Pengguna_BPJS_Kesehatan_Ancaman_Risiko_Strategi_Kemanan_Literature_Review
M. Furqan, M. S. Hasibuan, and B. Sapitri, “Application of the support vector machine algorithm in the classification of livable houses,” J. Mantik, vol. 7, no. 3, pp. 1643–1652, 2023.
Z. Tuasamu et al., “Analisis Sistem Informasi Akuntansi Siklus Pendapatan Menggunakan DFD Dan Flowchart Pada Bisnis Porobico,” J. Bisnis dan Manajemen(JURBISMAN), vol. 1, no. 2, pp. 495–510, 2023, [Online]. Available: https://ejournal.lapad.id/index.php/jurbisman/article/view/181
N. SEPTIARINA, “Perancangan Sistem Informasi Penerimaan Siswa Baru Berbasis Web Pada Smk Bandara,” PROSISKO J. Pengemb. Ris. dan Obs. Sist. Komput., vol. 8, no. 1, pp. 60–67, 2021, doi: 10.30656/prosisko.v8i1.2816.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma Vigenere Cipher Untuk Keamanan Data Bantuan Sosial Di Desa
ARTICLE HISTORY
How to Cite
Issue
Section
Copyright (c) 2025 Pazri, Abdul Halim Hasugian

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).