Development of Hill Cipher Method For Encryption And Decryption of Drug Prescriptions to Improve Data Security

Rahmad Ardhani, Hermawati Hermawati, Muhammad Misbahul Munir

Abstract


A prescription is a written request from a doctor to a pharmacist, as not everyone can know the dosage or type of a particular drug, especially patients who need a prescription for the drug must be kept secret. Rapid technological advances can have an impact on all sectors, both private and government, including the medical field. One of the medical services that utilizes IT is to send prescription messages electronically to pharmacists in response to doctors' requests. The many misuse of prescription drugs by irresponsible people and misreading prescription drugs by pharmacists can be fatal for patients, so a solution is needed to overcome these problems. The purpose of this study is to create an encrypted electronic recipe application using the Hill Cipher method. This research method generally starts from data collection, data analysis and encryption model development. Applications designed with the Hill Cipher Algorithm are developed with modified algorithm keys using postal code patterns as the matrix keys, this aims to achieve the maximum level of security. The results of the system functionality test using the black box method obtained normal results for all system test scenarios. Validity testing yields valid results. The final test, through questionnaire testing, obtained a good level of system feasibility, namely an average level of Service of 83%, Features of 78% and Performance of 81%. Overall, the system has given a good performance score as the accuracy of the system is above 70%.

Full Text:

PDF

References


M. Bennie, W. Malcolm, S. McTaggart, and T. Mueller, “Improving Prescribing Through Big Data Approaches—Ten Years of The Scottish Prescribing Information System,” Br. J. Clin. Pharmacol., vol. 86, no. 2, pp. 250–257, 2020, doi: 10.1111/bcp.14184.

C. G. Toxværd, K. S. Benthien, A. H. Andreasen, A. Nielsen, M. Osler, and N. B. Johansen, “Chronic Diseases in High-Cost Users of Hospital, Primary Care, and Prescription Medication in the Capital Region of Denmark,” J. Gen. Intern. Med., vol. 34, no. 11, pp. 2421–2426, 2019, doi: 10.1007/s11606-019-05315-w.

K. Ayu and W. Yulianingsih, “Simposium Hukum Indonesia,” Simp. Huk. Indones., vol. 1, no. 1, pp. 574–586, 2019.

W. L. Prabowo, “Teori Tentang Pengetahuan Peresepan Obat,” J. Med. hutama, vol. 02, no. 04, pp. 402–406, 2021.

K. Ulum, I. L. Hilmi, and S. Salman, “Review Artikel : Implementasi dan Evaluasi Peresepan Elektronik Dalam Upaya Menurunkan Kesalahan Pengobatan,” J. Pharm. Sci., vol. 6, no. 1, pp. 192–198, 2023, doi: 10.36490/journal-jps.com.v6i1.19.

F. Indrasari, R. Wulandari, and D. N. Anjayanti, “Peran Resep Elektronik dalam Meningkatkan Medication Safety pada Proses Peresepan di RSI Sultan Agung Semarang,” J. Farm. Dan Ilmu Kefarmasian Indonesia., vol. 7, no. 1SI, p. 1, 2021, doi: 10.20473/jfiki.v7i1si2020.1-6.

R. D. Garcia, G. S. Ramachandran, R. Jurdak, and J. Ueyama, “A Blockchain-based Data Governance Framework with Privacy Protection and Provenance for e-Prescription,” 2021.

J. R. Paragas, A. M. Sison, and R. P. Medina, “An Improved Hill Cipher Algorithm using CBC and Hexadecimal S-Box,” 2019 IEEE Eurasia Conf. IOT, Commun. Eng. ECICE 2019, no. October, pp. 77–81, 2019, doi: 10.1109/ECICE47484.2019.8942717.

E. Pawan and P. Hasan, “Optimization of Hill Cipher Method for Encryption and Decryption of Prescription Drugs at Puskesmas Twano Jayapura City,” Int. J. Comput. Inf. Syst., vol. 2, no. 4, pp. 149–154, 2021, doi: 10.29040/ijcis.v2i4.48.

A. Eko and S. Informatika, “Keamanan Pesan Teks Dengan Metode Enkripsi Dan Dekripsi Menggunakan Algoritma Rsa (Rivest Shamir Adleman) Berbasis Android,” Teknologi Pintar.org, vol. 3, no. 2, p. 1, 2023.

E. Endaryono, “Perancangan Simulasi Metode Caesar Cipher Menggunakan Microsoft Excel – Alternatif Media Pembelajaran Kriptografi,” SAP (Susunan Artik. Pendidikan), vol. 4, no. 3, 2020, doi: 10.30998/sap.v4i3.6289.

S. Hraoui, F. Gmira, M. F. Abbou, A. J. Oulidi, and A. Jarjar, “A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm,” Procedia Comput. Sci., vol. 148, pp. 399–408, 2019, doi: 10.1016/j.procs.2019.01.048.

R. A. Saputra and A. S. Purnomo, “Implementasi Algoritma Schnorr Untuk Tanda Tangan Digital,” JMAI (Jurnal Multimed. Artif. Intell., vol. 2, no. 1, pp. 21–26, 2018, doi: 10.26486/jmai.v2i1.69.

H. Y. Chen, Z. Y. Wu, T. L. Chen, Y. M. Huang, and C. H. Liu, “Security Privacy and Policy for Cryptographic Based Electronic Medical Information System,” Sensors (Switzerland), vol. 21, no. 3, pp. 1–14, 2021, doi: 10.3390/s21030713.

N. Nasron, S. Suroso, and C. Buana, “Rancang Bangun Pengaman Rumah dan Kontrol Pada Kunci Pintu dengan Metode Kriptogafi Hill Cipher Berbasis IoT,” PRotek J. Ilm. Tek. Elektro, vol. 7, no. 2, pp. 104–109, 2020, doi: 10.33387/protk.v7i2.2073.

D. M. Sholahudin and A. Asmunin, “Implementasi Algoritma Hill Cipher untuk Proses Enkripsi dan Dekripsi Citra Berwarna dengan Modifikasi Padding,” J. Informatics Comput. Sci., vol. 1, no. 04, pp. 228–234, 2020, doi: 10.26740/jinacs.v1n04.p228-234.

U. Indriani, H. Gunawan, A. Yugo Nugroho Harahap, and H. Zaharani, “Chat Message Security Enhancement on WLAN Network using Hill Cipher Method,” 2020 8th Int. Conf. Cyber IT Serv. Manag. CITSM 2020, 2020, doi: 10.1109/CITSM50537.2020.9268838.

E. Safrianti and F. Fitriansyah, “Cryptography With Layered Algorithms for Text Security On Android,” Int. J. Electr. Energy Power Syst. Eng., vol. 3, no. 2, pp. 35–39, 2020, doi: 10.31258/ijeepse.3.2.35-39.

R. Ardhani, M. M. Munir, and A. M. Dawis, “Penerapan Metode Waterfall Dalam Perancangan Sistem Informasi E-Learning Berbasis Web Pada Madrasah Tsanawiyah (Mts) Al-Wusho Rumah Setia Rumah Setia,” J. Innov. Futur. Technol., vol. 5, no. 2, pp. 64–73, 2023, doi: 10.47080/iftech.v5i2.2754.

M. Gobi and B. Arunapriya, “A Survey on Public-Key and Identity-Based Encryption Scheme with Equality Testing over Encrypted Data in Cloud Computing,” vol. 13, no. 2, pp. 2129–2134, 2022.

G. G. Deverajan, V. Muthukumaran, C. H. Hsu, M. Karuppiah, Y. C. Chung, and Y. H. Chen, “Public Key Encryption With Equality Test for Industrial Internet Of Things System in Cloud Computing,” Trans. Emerg. Telecommun. Technol., vol. 33, no. 4, pp. 1–15, 2022, doi: 10.1002/ett.4202.

R. Gusmana, Haryansyah, and Adimulya Dyas Wibisono, “Implementasi Algoritma Hill Cipher Menggunakan Kunci Matriks 2x2 Dalam Mengamankan Data Teks,” Gener. J., vol. 7, no. 3, pp. 31–39, 2023, doi: 10.29407/gj.v7i3.21105.

D. Astuti and C. Sundari, “Implementasi Algoritma Vigenere Cipher Untuk Enkripsi Dan Dekripsi Pada Peresepan Data Obat Di Puskesmas Mertoyudan 1 Kabupaten Magelang,” J. Tek. Inf. dan Komput., vol. 5, no. 2, p. 341, 2022, doi: 10.37600/tekinkom.v5i2.534.

Y. W. Hasibuan, R. B. Veronica, J. Matematika, U. N. Semarang, K. S. Gunungpati, and I. Artikel, “How to Cite,” vol. 11, no. 1, pp. 54–68, 2022.

O. Laia, E. M. Zamzami, and Sutarman, “Analysis of Combination Algorithm Data Encryption Standard (DES) and Blum-Blum-Shub (BBS),” J. Phys. Conf. Ser., vol. 1898, no. 1, 2021, doi: 10.1088/1742-6596/1898/1/012017.

R. Hassan, S. Pepic, M. Saracevic, K. Ahmad, and M. Tasic, “a Novel Approach To Data Encryption Based on Matrix Computations,” Comput. Mater. Contin., vol. 66, no. 2, pp. 1139–1153, 2020, doi: 10.32604/cmc.2020.013104.

J. H. Sinaga, M. Pangaribuan, F. Fazly, I. Rivaldo, and I. Gunawan, “Penerapan Enkripsi Dan Deskripsi Menggunakan Algoritma Data Encryption Standard Dengan Pemrograman Matlab,” J. Media Inform., vol. 4, no. 1, pp. 63–69, 2022, doi: 10.55338/jumin.v4i1.468.

S. Ramadhani, “Hybird Cryptosystem Algoritma Hill Cipher dan Algoritma Elgamal Pada Keamanan Citra,” METHOMIKA J. Manaj. Inform. dan Komputerisasi Akun., vol. 4, no. 1, pp. 1–9, 2020, doi: 10.46880/jmika.vol4no1.pp1-9.




DOI: https://doi.org/10.32520/stmsi.v13i5.4559

Article Metrics

Abstract view : 38 times
PDF - 10 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.