Published 2022-03-31
Keywords
- Asymmetric, Symmetric, Encryption, Private Key, Public Key
Abstract
Information security is today’s everybody’s concern. Technology keeps on increasing however the issue of information theft are getting higher. The confidentiality, integrity and availability of information are being compromised and always at risk though information security are keeps on improving. This study aimed to build an information security using a text-based platform to store the data and preserved its confidentiality, integrity and availability. The study will focus on the security of information and its confidentiality, integrity, and availability. An information system was developed using Java. Once the user started to process the data, the system will automatically create a text file where data inputted from the system will be are stored. The system will generate text-based formats per user. Another text file pass dot(.) txt whew passwords are stored. The data or information are stored in different text files. The transaction data and passwords are encypted using asymmetric algorithms. Each user account should have a private key to be able to access the data. Once the user is log in to the system, user will use a public key to able to access the data. Moreover, the text files where the passwords are kept and the text files where data are stored will be encrypted using symmetric algorithm which uses a public key to all users. The researcher used descriptive research design in the project. Descriptive research is being used by the proponents to describe the assessment of the respondents in the security of an information.