DESIGN AND IMPLEMENTATION OF SENSITIVE DROP OUT DATA COLLECTION SYSTEM USING HOMOMORPHIC ENCRYPTION ALGORTIHM

Not all drop out cases are purely caused by student mistakes. To overcome these drop out problems, an in-depth analysis of the cases that occur is needed to be handled properly. Often drop out cases are only associated with problems that are too general. More detailed problems, especially those t...

Full description

Saved in:
Bibliographic Details
Main Author: Suwandi, Rifki
Format: Theses
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/45677
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:Not all drop out cases are purely caused by student mistakes. To overcome these drop out problems, an in-depth analysis of the cases that occur is needed to be handled properly. Often drop out cases are only associated with problems that are too general. More detailed problems, especially those that contain sensitive factors that can harm certain parties, in this context such as the reputation of the institution are usually not made public. There are many risks associated with making a single repository for sensitive information like this. Therefore, several methods are needed to guarantee the security and confidentiality of data, one of which is the use of data encryption. However, ordinary encryption does not guarantee that data will not be leaked by certain parties, especially those who are internal. This research discusses the solution offering in the form of a drop out data collection system using an encryption algorithm that has homomorphic properties. Data can be collected under the security factors provided by this encryption algorithm. In addition, the homomorphic nature of the algorithm allows data to be accumulated without having to decrypt it first. According to the test, this system can encrypt the integer data, resulting ciphertext with size 4 times larger than the plaintext, with average encryption processing time 2549102 nanoseconds, and resulting ciphertext that has different value each other. The system can perform the calculation using homomorphic property and produce output that has same result with desired plaintext after decrypted.