Claim Missing Document
Check
Articles

Found 5 Documents
Search

RAW DATA SECURITY BY USING ELGAMAL AND SHA 256 PUBLIC KEY ALGORITHM Surya Permana, Indra; Hidayat, Taufik; Mahardiko, Rahutomo
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (163.842 KB) | DOI: 10.31943/teknokom.v4i1.53

Abstract

The development of information technology has grown exponentially and various of data collections and its method has been obtained. In the era of big data, data has now become an asset that held important values, while in the implementation of data delivery, it clearly is not always safe. One of the method to secure data delivery is data encryption using Cryptography. Cryptography provides an encryption service to secure data delivery by transforming it to random values so that it can no longer be read. The goal in this study was to produce an application that could be used to encrypt data, using ElGamal's cryptography method and hash checking using the SHA256 algorithm. After encryption, to ensure the encrypted data is still the original data without any changes or manipulation by unauthorized 3rd party then done by checking the hash generated using SHA256 algorithm. The data used in this study was a sample of raw data from the ATPWTP survey (ability to pay and willing to pay) conducted by the BPS Cirebon (Central Statistics) in 2019 and the data was in the form of Excel and txt files. The encryption process resulted in a cipher larger than the plaintext and takes longer for the data encryption process than during the data cipher decryption process.
MOBILE SCANNER ADOPTION ANALYSIS BETWEEN EMPLOYMENT AND EDUCATIONAL BACKGROUND – AN ANALYSIS OF LOGISTIC REGRESSION Permana, Indra Surya; Hidayat, Taufik; Mahardiko, Rahutomo
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (280.25 KB) | DOI: 10.31943/teknokom.v4i2.56

Abstract

As of today, the mobile apps may be downloaded everywhere. The development of mobile apps depends on the type of the work. An increasing use of mobile app is scanner apps due to an easy use. This paper presents the regression analysis on employment and educational background of the mobile scanner app because this research used category in the questionnaire. The use of logistic regression is to prove that any different comparisons are detected between employment and educational background so that the use of mobile scanner can be optimally used. The results show that educational background and employment have vital roles for mobile scanner adoption. This study also proves that previous researches on mobile scanner adoption were true for UTAUT model and comparison analysis.
DATA ENCRYPTION ALGORITHM AES BY USING BLOCKCHAIN TECHNOLOGY: A REVIEW Hidayat, Taufik; Mahardiko, Rahutomo
BACA: Jurnal Dokumentasi dan Informasi Vol. 42 No. 1 (2021): BACA: Jurnal Dokumentasi dan Informasi (Juni)
Publisher : Direktorat Repositori, Multimedia, dan Penerbitan Ilmiah - Badan Riset dan Inovasi Nasional (BRIN Publishing)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14203/j.baca.v42i1.643

Abstract

Blockchain is used as encryption algorithm in cryptocurrency, but less researches are found to study blockchain for data encryption. Data encryption is needed to protect the data from data theft. We know about data encryption, there are RSA, LEAP, AES, and other algorithms. This research proposed a review in AES algorithm for data encryption within blockchain technology. The research process is followed by determining library, then creating relevant questions and criteria. For good opportunity in the future, this paper generated suggestions and opportunities so that better research can be established in data encryption.
A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing Hidayat, Taufik; Mahardiko, Rahutomo
International Journal of Artificial Intelligence Research Vol 4, No 1 (2020): June
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (344.268 KB) | DOI: 10.29099/ijair.v4i1.154

Abstract

Cloud computing is one revolution in information technology (IT) that can share resources, services and data through a network among users. Because users have same rights on the network to transfer data, data are vulnerable to be attacked by unauthorized person. Lately, data security in a system only concentrates on data storage on cloud by utilizing internet security, but a little concentration is found during data transfer. By considering security as a serious problem, an encryption-based proposed system is presented to secure during data transfer. Authors propose an approach to boost system security during data transfer in order to prevent data theft by unauthorized person. To prevent an attack by unauthorized person, Advanced Encryption Standard (AES) will be proposed to secure data transfer and storage in cloud computing. For better future, authors will propose Systematic Literature Review (SLR) to generate suggestions and opportunities in AES cloud computing.
Load Balancing Network by using Round Robin Algorithm: A Systematic Literature Review Hidayat, Taufik; Azzery, Yasep; Mahardiko, Rahutomo
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i2.446

Abstract

The use of load balance on a network will be very much needed if the network is an active network and is widely accessed by users. A reason is that it allows network imbalances to occur. Round Robin (RR) algorithm can be applied for network load balancing because it is a simple algorithm to schedule processes so that it can provide work process efficiency. Authors use the Systematic Literature Review (SLR) method in which it can be applied for criteria selection during papers search to match the title being raised. SLR is divided into five stages, namely formalization of questions, criteria selection, selection of sources, selection of search results, and quality assessment. By using SLR, it is expected that papers according to criteria and quality can be found.