Claim Missing Document
Check
Articles

Found 4 Documents
Search

Implementasi Algoritma Hill Cipher dengan Matriks Kunci 3x3 dalam Mengamankan Data Teks Gusmana, Roman; Haryansyah, Haryansyah
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) Vol 7, No 4 (2024): Agustus 2024
Publisher : Program Studi Teknik Komputer, Fakultas Teknik. Universitas Serambi Mekkah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32672/jnkti.v7i4.7670

Abstract

Abstrak - Keamanan data teks menjadi sangat penting dalam era digital, terutama untuk melindungi informasi dari akses yang tidak sah. Penelitian ini membahas penerapan Algoritma Hill Cipher dengan matriks kunci 3x3 untuk enkripsi data teks. Algoritma ini dipilih karena kemampuannya yang kuat dan efisien dalam menjaga kerahasiaan data melalui operasi aljabar linear. Metode penelitian meliputi pembangkitan matriks kunci 3x3, proses enkripsi dan dekripsi data teks, serta evaluasi efektivitas algoritma melalui berbagai skenario pengujian. Hasil penelitian menunjukkan bahwa Algoritma Hill Cipher dengan matriks kunci 3x3 mampu menghasilkan enkripsi yang kuat dan proses yang efisien, meskipun pemilihan kunci yang tepat sangat penting untuk menjaga tingkat keamanan. Penelitian ini menyimpulkan bahwa Algoritma Hill Cipher dengan matriks kunci 3x3 adalah metode yang efektif untuk mengamankan data teks. Temuan ini diharapkan dapat mendukung pengembangan metode enkripsi yang lebih aman di masa depan dan memberikan wawasan berharga bagi praktisi keamanan informasi.Kata kunci: Hill Cipher, Enkripsi Matriks, Keamanan Data Abstract - Text data security has become crucial in the digital era, especially to protect information from unauthorized access. This study discusses the application of the Hill Cipher algorithm with a 3x3 key matrix for text data encryption. This algorithm is chosen for its strong and efficient capability in maintaining data confidentiality through linear algebra operations. The research method includes the generation of a 3x3 key matrix, the encryption and decryption processes of text data, and the evaluation of the algorithm's effectiveness through various testing scenarios. The results indicate that the Hill Cipher algorithm with a 3x3 key matrix can produce strong encryption and efficient processes, although the correct selection of the key is essential to maintain a high level of security. This study concludes that the Hill Cipher algorithm with a 3x3 key matrix is an effective method for securing text data. These findings are expected to support the development of more secure encryption methods in the future and provide valuable insights for information security practitioners.Keywords: Hill Cipher, Matrix Encryption, Data Security
IMPLEMENTATION OF DATA ENCRYPTION IN AN IOT-BASED HEART RATE AND OXYGEN SATURATION BLOOD DETECTION TOOL USING THE ELGAMAL METHOD Haryansyah, Haryansyah
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the problems with Internet of Things (IoT) devices today is data security. Especially regarding IoT devices that function to read personal or confidential data such as health-related data. This research focuses on discussing data security techniques through the process of encrypting sensor data that reads heart rate and blood oxygen saturation from an IoT device. This data is quite personal and confidential data because it concerns a person's medical history. The encryption method that will be used is the Elgamal method. The Elgamal method is an asymmetric encryption method, meaning the key used for encryption is different from the key used for decryption. This elgamal method uses a public key for encryption and a private key for decryption. The research results show that implementing data encryption using the Elgamal method to secure data on IoT devices was successful. Data security can prevent misuse of data by unauthorized parties.
Penerapan Metode Levenshtein Distance untuk Koreksi Kesalahan Pengetikan Perintah Kendali Lampu IoT Haryansyah, Haryansyah
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) Vol 8, No 1 (2025): Februari 2025
Publisher : Program Studi Teknik Komputer, Fakultas Teknik. Universitas Serambi Mekkah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32672/jnkti.v8i1.8641

Abstract

Abstrak - Perkembangan Internet Of Things (IoT) telah melahirkan bebagai cara untuk membuat perangkat cerdas yang dapat di pantau atau dikendalikan dari jarak jauh melalui internet. Salah satunya adalah kendali lampu menggunakan pesan singkat. Teknologi ini dapat diterapkan untuk mengendalikan lampu rumah tangga dari jarak jauh hanya dengan mengirimkan pesan ke perangkat IoT untuk diproses guna menyalakan atau mematikan lampu. Permasalahan yang muncul adalah seringnya terjadi kesalahan pengetikan perintah (typo) yang menyebabkan perangkat tidak bisa mengenali dan memproses perintah yang diberikan. Kesalahan pengetikan ini dapat diatasi dengan metode koreksi kata, salah satunya menggunakan metode Levenshtein Distance. Levenshtein Distance adalah metode untuk memproses teks yang digunakan untuk mengukur kemiripan dua buah teks dan menghitung jumlah minimum operasi yang diperlukan untuk mengubah suatu teks menjadi teks lainnya. Pada penelitian ini, akan mengukur kemiripan teks perintah yang diberikan melalui pesan telegram dengan perintah yang terdaftar dan melakukan koreksi apabila terjadi kesalahan pengetikan. Perintah yang telah diproses akan diuji untuk mengendalikan lampu pada perangkat IoT. Perangkat yang dibuat menggunakan mikrokontroller NodeMCU ESP8266, modul relay dan juga lampu. Hasil yang didapatkan menunjukkan bahwa mikrokontroller mampu memproses teks dengan melakukan koreksi teks pada perintah yang salah sehingga mampu menyalakan dan mematikan lampu sesuai dengan pengujian perintah yang ada.Kata kunci: Levenshtein Distance, Koreksi Kata, IoT, Telegram, NodeMCU Abstract - The development of the Internet of Things (IoT) has given birth to various ways to create smart devices that can be monitored or controlled remotely via the internet. One of them is controlling lights using short messages. This technology can be applied to control household lights remotely by simply sending a message to the IoT device to be processed to turn the lights on or off. The problem that arises is the frequent occurrence of typing errors (typos) which cause the device to be unable to recognize and process the given commands. This typing error can be overcome by a word correction method, one of which is using the Levenshtein Distance method. Levenshtein Distance is a method for processing text that is used to measure the similarity of two texts and calculate the minimum number of operations required to change one text into another. In this study, we will measure the similarity of the command text given via telegram messages with the registered commands and make corrections if there are typing errors. The processed commands will be tested to control the lights on the IoT device. The device is made using the NodeMCU ESP8266 microcontroller, relay module and also lights. The results obtained show that the microcontroller is able to process text by correcting text on incorrect commands so that it is able to turn the lights on and off according to the existing command test.Keywords: Levenshtein Distance, Word Correction, IoT, Telegram, NodeMCU
Scheduling Uses the Blynk 2.0 Automations Feature for Effective Ornamental Fish Feeding Haryansyah, Haryansyah; Hadriansa, Hadriansa; Ardiansyah, Riswan
APTISI Transactions on Management (ATM) Vol 7 No 2 (2023): ATM (APTISI Transactions on Management: May)
Publisher : Pandawan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/atm.v7i2.2022

Abstract

Maintenance of ornamental fish can not be separated from the importance of regular feeding. Feeding which is still done manually will of course confiscate time and requires patience. However, the problem is when traveling that it doesn't Allows manual feeding. Matter this requires a system or tool that can provide fish feed automatically based on a schedule which is determined. One that can be used is with create Internet of Things (IoT)-based devices. There have been many developments in IoT-based devices gave birth to a variety of features that can be utilized in create automation tools in everyday life. Wrong one of which is a feature on the Blynk 2.0 application. on this application there is one feature that can be utilized in the process scheduling to perform one particular activity that very easy for users without having to be difficult to make a program commonly known as Automation feature. This feature will work continuously periodically according to a predetermined schedule. On research this will take advantage of these features in the manufacture of tools automatic fish feeding automation. scheduling feeding fish will utilize automation features at the same time can be monitored when the last feed was given. This study utilizes the NodeMCU ESP8266 as main controller and servo motor as driving tool feeder. The tool will be connected to the Blynk application via Wi-Fi network.