Claim Missing Document
Check
Articles

Found 5 Documents
Search

Combination of AES (Advanced Encryption Standard) and SHA256 Algorithms for Data Security in Bill Payment Applications Rais Rabtsani, Muhamad; Triayudi, Agung; Soepriyono, Gatot
SAGA: Journal of Technology and Information System Vol. 2 No. 1 (2024): February 2024
Publisher : CV. Media Digital Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58905/saga.v2i1.250

Abstract

In the era of information technology development, digital payments and e-payments are becoming a dominant trend, supported by the crucial role of payment gateways such as Midtrans. Midtrans uses APIs to facilitate various online transactions, including debit cards. In this research, two cryptographic algorithms will be combined, namely Advance Encryption Standard (AES) with 256 bits and Secure Hash Algorithm (SHA) with 256 bits. The importance of data security in e-payments is recognized, with the application of cryptographic algorithms to protect sensitive transaction information. Yayasan Antero Prosesi Edukasi (YAPE) as an educational marketing consultant faced the challenge of time-consuming and inefficient manual payments. In an effort towards efficiency and security, YAPE plans to develop an online payment application with Midtrans Payment Gateway and the use of AES-256 and SHA-256 cryptographic algorithms. This step is expected to help the foundation keep up with technological developments, provide ease of payment, and achieve computerized efficiency. The results showed that the use of a combination of AES 256 bit and SHA256 encryption significantly increased security, making hacking attempts ineffective because encrypted data could not be accessed, with quite complicated calculation stages.
Efficient Market of Indonesia Shariah Index during Covid Faisal, Andri; Soepriyono, Gatot
Jurnal Ekonomi dan Perbankan Syariah Vol 12, No 1 (2024): Journal of Islamic Economics and Banking
Publisher : Institut Agama Islam (IAI) SEBI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46899/jeps.v12i1.521

Abstract

ABSTRACT. The capital market is a place to gain capital at there. There is efficient market that past stock price reflects the current recent price. Unfortunately, the stock price is so volatile and it is difficult to predict it. The concept of random walk also occurs in stock price or stock index. During the covid, the stock price decrease and it is so interesting to predict the stock whether follow the random walk or not.  In order to forecast stock price, the investor should know the price of the stock. They can get benefit from the difference of the stock. The adf and KPSS test show the Jakarta shariah index does not follow random walk, meaning the index can be forecast.  The result of the test shows the best model is ARIMA (5,1,2). Arima is a best forecasting method that can predict stock price. The Model has passed Ljung Box, ACF Graphics and also PACF Graphics. 
Penerapan Market Basket Analysis Data Mining Pada Penjualan Batik dengan Menerapkan Algoritma Apriori Soepriyono, Gatot
Journal of Computer System and Informatics (JoSYC) Vol 5 No 3 (2024): May 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josyc.v5i3.5198

Abstract

Batik is a cloth that is depicted by applying wax to the cloth and processing it in a certain way. In certain batik companies, there are products that are characteristic of that company. As time goes by, problems arise with the sale of batik due to lack of proper stock availability in shops, making it difficult for customers to order batik. This problem that occurs is certainly a problem that must be resolved. If the available stock of goods does not match the customer's wishes, the goods will be piled up in the shop's stock. Apart from that, if the customer does not find a batik model that suits his wishes, it will cause the customer to switch to another shop. The sales results are reported in the form of a ledger or entered into a computer. The report produced is a sales transaction data report. Data mining itself is a process of processing quite large amounts of data. In the future, the data recorded in the ledger can be used as information in determining business strategies for batik sales. Market Basket Analysis aims to manage customer data or sales data. The a priori algorithm is an association part of mining data. A priori algorithms can help in forming candidate item combinations. From the results of the research carried out, there is 1 combination of items that meets the support value of 30%, namely items T09 and T12, where the support value obtained is 30.76% and with a confidence value of 100%.
Rancang Bangun Website Pengamanan Database E-Voting dengan Menerapkan Algoritma Rivest Shamir Adleman (RSA) Setiawan, Danis; Andrianingsih, Andrianingsih; Soepriyono, Gatot
Jurnal Teknologi Informatika dan Komputer Vol. 9 No. 2 (2023): Jurnal Teknologi Informatika dan Komputer
Publisher : Universitas Mohammad Husni Thamrin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37012/jtik.v9i2.1687

Abstract

Algoritma Rivest Shamir Adleman (RSA) dapat diterapkan pada sistem pemungutan suara elektronik untuk mengenkripsi informasi pemilih dan hasil pemilu sehingga hanya orang yang berwenang yang dapat mengaksesnya. Ini dapat membantu menjaga kerahasiaan informasi pemilih dan mencegah manipulasi data pemilu. Metode Agile baik untuk proyek yang membutuhkan fleksibilitas dan kemampuan menyesuaikan diri dengan perubahan. Untuk menggunakan kriptografi algoritma kunci asimetris RSA, ada tiga langkah utama yang dilakukan, yaitu pembangkitan kunci dan operasi enkripsi dan dekripsi. Karena algoritma ini termasuk algoritma asimetris yang menggunakan kunci enkripsi dan kunci dekripsi, data yang dikirim antara pengguna dan server dienkripsi dengan kunci publik dan kunci privat, sehingga hanya dapat didekripsi dengan kunci yang disimpan oleh pengguna sendiri di server. Salah satu metode pengujian keamanan yang dikenal sebagai pengujian brute force bertujuan untuk mencoba semua kombinasi password atau kunci enkripsi yang mungkin untuk mendapatkan akses yang tidak sah. Pengujian yang melibatkan alat seperti OWASP ZAP dan BurpSuite menemukan kerentanan keamanan seperti SQL injection dan Cross-Site Scripting (XSS). Penelitian ini berhasil mengembangkan situs web E-Voting yang melindungi data dengan menggunakan algoritma RSA. Sistem ini memungkinkan pemilih untuk melakukan pemilihan elektronik dengan aman dan efektif. Website evoting harus dipantau secara teratur untuk mencegah serangan keamanan yang dapat merusak kerahasiaan dan integritas data pemilih.
Perancangan UI/UX Pada Aplikasi Ahmad Resto Metode Design Thinking Bani, Ahmad Syah; Winarsih, Winarsih; Soepriyono, Gatot
e-Jurnal JUSITI (Jurnal Sistem Informasi dan Teknologi Informasi) Vol. 13 No. 2 (2024): e-Jurnal JUSITI
Publisher : Universitas Dipa Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36774/jusiti.v13i2.1638

Abstract

Aplikasi “Ahmad Resto” muncul sebagai jawaban terhadap kebutuhan konsumen Muslim yang semakin meningkat untuk dapat menemukan makanan halal dengan mudah dan cepat. Makanan ataupun minuman halal ialah makanan ataupun minuman yang dibuat dan disajikan sesuai dengan aturan-aturan Islam, dan harus memenuhi beberapa syarat tertentu, seperti bahan-bahan yang digunakan harus halal atau tidak. Selain itu, aplikasi 'Ahmad Resto' juga membuka peluang bagi para usaha kuliner terutama kafe yang ingin menjangkau pasar Muslim. Dengan menggunakan aplikasi ini, usaha kuliner terutama pemilik bisnis kafe dapat memperluas jangkauan bisnisnya dan menawarkan makanan maupun minuman halal dengan lebih mudah. Dengan menggunakan metode Design Thinking dalam melakukan penelitian (User Interface/User Experience) dan menggunakan metode kuesioner USE untuk mendapatkan hasil data aplikasi dari calon pengguna Ahmad Resto yang telah memudahkan dan memenuhi kebutuhan pengguna.