APLIKASI TOKO ALAT MUSIK DENGAN KEAMANAN PASSWORD KRIPTOGRAPI KODE GESER
Main Article Content
Abstract
Article Summary
This encryption technique is used to secure customer data by shifting the characters in the message. This technique is used in musical instrument store applications to ensure the security of customer information such as personal details and financial information. This application was made to make it easier for users to find and buy the desired musical instrument online. Users can create accounts, enter personal information, and generate passwords that are encrypted with slide code cryptography. Customer information will be stored securely on the application server, only to be accessed with the correct password. Password security is very important to protect customer personal data and prevent unauthorized access by unauthorized parties. By implementing a sliding code cryptographic password security system, this musical instrument store application can provide additional security for users and protect their personal information from cyber threats. In conclusion, the sliding code cryptographic password security application is an effective solution to ensure customer data security and makes it easier for users to search and buy musical instruments online.
Keywords
Article Keywords
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-BY 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Diffie, W. and Hellman, M.E., 1976. " New Directions in Cryptography" IEEE Transactions on Information Theory, v. IT-22, n. 6.
Deitel, P. , D. H. , & M. M. 2010. Java: Bagaimana cara program. Penerbit Andi. Penerbit Andi.
Sitorus, R. 2018. Pemrograman Java dengan NetBeans Framework. PT Elex Media Komputindo. PT Elex Media Komputindo.
Shin, Y. J. , K. J. H. , & K. J. K. 2016. Design and implementation of a secure authentication system based on user authentication using a one-time password and PKI. International Journal of Distributed Sensor Networks, 12(4), pp. 1-10.