Claim Missing Document
Check
Articles

Found 3 Documents
Search

Implementation Of The Base64 Algorithm For Text Encryption And Decryption Using The Python Programming Language Pamungkas, Caroko Aji; Pratama, Zudha; Setiarso, Ichwan; Doheir, Mohamed
(JAIS) Journal of Applied Intelligent System Vol. 9 No. 1 (2024): Journal of Applied Intelligent System
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jais.v9i1.10310

Abstract

The exchange of information on the Internet requires increased protection to avoid potential threats to privacy and security. This study identified the main issues in this regard: the need for simple and effective tools for encoding and decoding messages, and the need to understand Base64 encoding algorithms and concepts. However, to overcome this problem the author developed an application to encode and decode messages/text using the Base64 algorithm and the Python programming language. This application allows users to send secret messages/text securely via and convert the data into Base64 format for secure transmission via text media. It also covers the basics of cryptography, Base64 algorithms, and how to use the Python programming language to develop secure applications. The result of this research is a simple and effective encryption and decryption application. This application provides a solution for users to protect messages or text when they want to change confidential information by converting it to Base64 format. With this application, you can send secret messages or texts with the confidence that only authorized parties can read them. Implementing message encryption and decryption using the Base64 algorithm using Python is an important step in maintaining message privacy and security in the current digital era. This research succeeded in developing an application suitable for this purpose. Therefore, the next step is to improve the security of your application by implementing stronger encryption algorithms. Additionally, we provide a more comprehensive user guide to help users better understand cryptographic concepts. Further research may focus on integrating applications with broader Internet security protocols to address increasingly complex security threats.
Edukasi Bagi Mahasiswa Pengelolaan Perhotelan Tentang Pemilihan Supplier Bahan Makanan Hotel Setiawan, Aries; Prawitasari, Dian; Andika, Arditya Dian; Nuryanto, Imam; Aminah Rizkia Puspita Sari, Raden Ayu; Ratnawati, Juli; Setiarso, Ichwan; Suharnawi, Suharnawi
ABDIMASKU : JURNAL PENGABDIAN MASYARAKAT Vol 8, No 2 (2025): MEI 2025
Publisher : LPPM UNIVERSITAS DIAN NUSWANTORO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/ja.v8i2.3023

Abstract

Salah satu jenis penginapan yang permintaannya sangat meningkat adalah hotel, bertumbuhnya permintaan terhadap jasa penginapan salah satunya dilatar belakangi karena meningkatnya industri pariwisata. Untuk meningkatkan permintaan tamu maka dari sisi layanan makanan untuk tamu hotel, banyak faktor juga yang membutuhkan perhatian seperti kualitas bahan makanan yang berpengaruh pada cita rasa yang dihasilkan. Untuk mendapatkan komoditi bahan makanan yang bagus maka pihak hotel perlu memilih suplier yang mampu diberikan kepercayaan dalam memasok bahan makanan. Untuk mendapatkan komoditi bahan makanan yang bagus maka pihak hotel perlu memilih suplier yang mampu diberikan kepercayaan dalam memasok bahan makanan. Program edukasi ini bertujuan untuk memberikan bekal pengetahuan bagi para mahasiswa dalam bertindak melalui proses pengambilan keputusan pemilihan supplier. Pengambilan keputusan tentang pemilihan supplier dari sejumlah variabel dengan metode simple additive weigting mampu menciptakan hasil keputusan yang obyektif. Peningkatan pengetahuan melalui  edukasi mampu memberikan informasi yang lebih yang tidak diperoleh dalam perkuliahan.
Hybrid image encryption using quantum bit-plane scrambling and discrete wavelet transform Rachmawanto, Eko Hari; Susanto, Ajib; Hermanto, Didik; Sari, Christy Atika; Setiarso, Ichwan; Sarker, Md Kamruzzaman
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.8887

Abstract

Digital image security is increasingly vulnerable to sophisticated attacks, underscoring the urgent need for robust encryption techniques. Traditional encryption methods often fall short in defending against advanced threats, highlighting the importance of innovative solutions to protect digital images. This study tackles these challenges by incorporating quantum computing into image encryption, employing techniques such as bit-plane scrambling, pixel permutation, and bit permutation. These strategies enhance security by introducing complex, non-linear transformations that make decryption attempts significantly more difficult without the correct cryptographic keys. A key configuration based on r=44, μ=2024 is employed to achieve this. The integration of quantum bit-plane scrambling and quantum pixel permutation results in a highly secure encryption method. Experimental results show substantial improvements in entropy levels, along with strong unified average changing intensity (UACI) and number of pixels change rate(NPCR) values across various images. Notably, the "Peppers" image achieved the best performance, with UACI values of 33.5572 and NPCR values of 99.8301. The method proves highly effective, as repeated tests with incorrect keys failed to decrypt the plain image accurately. Future research could explore the addition of a discrete quantum wavelet transform to further enhance the security and efficiency of quantum-based image encryption methods.