Claim Missing Document
Check
Articles

Found 3 Documents
Search

Implementasi Algoritma Vigeneere Cipher dan GOST Dalam Keamanan Data Anas, Irfan; Nanda, Putra Arya; Hidayat, Abdul
Sinkron : jurnal dan penelitian teknik informatika Vol. 2 No. 2 (2018): SinkrOn Volume 2 Nomor 2 April 2018
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (686.911 KB)

Abstract

Pertukaran data informasi di dunia maya sangat banyak dilakukan sekarang ini dan sangat rentan terhadap bahaya akan penyalahgunaan serta penyadapan oleh pihak-pihak yang tidak bertanggung jawab dikarenakan lemahnya proses pengamanan. Tindakan penyalahgunaan pada saat bertukar informasi dapat teratasi dengan menggunakan teknik kriptografi. Kriptografi sendiri memiliki berbagai macam algoritma, misalnya vigeneee cipher, hill cipher, GOST, AES dan lainnya. Teknik Kriptografi dapat mengamankan data berupa teks dengan proses enkripsi dan deskrpsi sehingga data akan aman. Algoritma GOST juga yang penggunaanya sama dengan algoritma vigenere cipher. Penelitian ini menguraikan pengkombinasian dua algoritma ini dalam mengamankan data berjenis teks yang sifatnya rahasia atau penting. Kombinasi dua metode ini diharapkan dapat dijadikan sebagai salah satu solusi dalam pengoptimalan pengaman data khususnya data yang sifatnya rahasia.
Perancangan Aplikasi Keamanan Data Dengan Kombinasi Algoritma Kriptografi RC4 Dan One Time Pad Anas, Irfan; Ginting, Guidio Leonarde; Ndruru, Eferoni; Sembiring, Abdul Sani; Zebua, Taronisokhi
JURIKOM (Jurnal Riset Komputer) Vol 8, No 1 (2021): Februari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i5.2541

Abstract

Data is an important aspect that has important information in it, which includes numbers, characters, symbols, pictures, sounds, or other signs that can be used as information. Data are certain facts, thus producing information. Cryptography is often used to secure and encode text data, messages, or other information, so using cryptographic algorithms on text data is able to secure data that is very important to everyone. So the expected results from the RC4 Cryptography algorithm and One Time Pad, which are used in text data can help in securing or encoding very important text data, so that the text is not easy to read or know the original message.
Legal Consequences of Transferring the Name of Land Certificate on Unpaid Sales Anas, Irfan; Cahya Kumala, Yudha; Akkapin, Supaphorn
LAW & PASS: International Journal of Law, Public Administration and Social Studies Vol. 1 No. 6 (2025): February
Publisher : PT. Multidisciplinary Press Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47353/lawpass.v1i6.57

Abstract

This research examines the legal consequences of the transfer of the name of the land certificate in an unpaid sale and purchase transaction. The purpose of this study is to analyze how the process of transferring land rights can occur even though payment has not been fully implemented, as well as to identify the legal implications arising from incomplete payment in land sale and purchase transactions. Through a normative legal analysis approach, this study concludes that the transfer of land rights that have not been paid in full can lead to legal uncertainty, both in relation to the validity of the transaction and the potential for future property rights disputes. Therefore, stricter regulations and better supervision of land transactions that have not met the full payment requirements are needed. This research is expected to contribute to the development of agrarian law and become the basis for more effective policy recommendations in order to provide legal certainty in the transfer of land rights.