Cryptography Generator for Prevention SQL Injection Attack in Big Data

Currently, especially in Indonesia, data leaks occur in domestic agencies and private e-commerce. From these problems, cryptographic researchers are needed to make the data difficult to read, this research forms cryptography through a substitution method which will determine the number of keys that have been used and generated back in the dictionary, in its implementation the researcher uses the Devops design method, this method uses 4 stages, namely 1. ) continues development, 2) continues testing, 3) continues integration, 4) continues development. The results obtained by the text can be encrypted and described perfectly and successfully as much as 15864 data, and consumes low resources .


INTRODUCTION
Cases of personal data leakage are increasingly common.As is the case with domestic agencies, large amounts of data leaks are data managed by the health social security agency, in which the leaked data contains information such as card numbers, family data, dependent data and payment status.This data leak occurs when a data buyer with the initials kort wants to resell data in an online forum.The data contains 279 million data on the identity of Indonesian citizens (Widya,2021).
From this case, it is dangerous if the data is scattered and misused, this can harm many parties.A good method to use is to use cryptography used in securing writing that is sent from one place to another (Anggraini,2020).Cryptography includes techniques such as: microdots, combining words with pictures, and other ways to hide information in a storage or transit (Gaurav,2013).Writing is known as plaintext while messages are encoded and called cipertext.This process is known as encryption or encryption (wiliam,2012;Fauzi, 2020;Martiano, 2021).
In this study, the researcher uses a cryptographic substitution method that has been modified and can be generated every month and made in the form of a file, in order to create difficulties in trying to re-decrypt with the brute force method or other techniques (Martiano, 2021;Marnoko, 2020).

RESEARCH METHOD
The first thing the researchers did was to design an algorithm, where the plaintext, the key source will be determined, for example A1, the key determination comes from the number of messages that will be limited for example 5 if the number of plains is more than 5 then the algorithm will randomize the In measuring the suitability of the results, it will compare the suitability of the results of the encryption and its description whether it is good or not.

RESULTS AND DISCUSSIONS
During testing and implementation, the stages are design, testing, and implementation.This can be broken down through the following process: 3.1 continuous development by taking the name data as plaintext in the database, by setting the key as a marker so that it appears in the image below, then the base key will be parsed and marked with the file name as limit.The design can be seen in the image below  at this stage after the algorithm has successfully encoded the sentence and returns the sentence perfectly then.The algorithm is modified in order to be able to manage data in the database, it is hoped that the algorithm will replace the encryption data that has been provided, the design can be seen in the following figure:

CONCLUSION
This research shows good results for the data encrypted in a database in its implementation, this implementation uses Devops design techniques which help researchers in designing software much better.From the results of observations of computer performance in running applications using low resources so that the computer is not burdened to carry out other activities.Computer performance can be seen in the image below.

297
As for the shortcomings contained in this study, the authors hope that they can be developed for future research.Amen

CONCLUSION
This research shows good results for the data encrypted in a database in its implementation, this implementation uses Devops design techniques which help researchers in designing software much better.From the results of observations of computer performance in running applications using low resources so that the computer is not burdened to carry out other activities.Computer performance can be seen in the image below.

r
Figure 1.Encryption process and word description

Figure 3 .
Figure 3. Encryption Process Diagram and Text Description a. countinus testing In this section, the parsing algorithm tests the key base contained in each file.Is the algorithm successful in encrypting sentences.And also the algorithm should be able to return the text perfectly.The sequence of the algorithm can be seen from the image below:

Figure 7 .
Figure 7. Cryptographic implementation to the database

Figure 10 .
Figure 10.Computer Performance in cryptographic algorithms