Claim Missing Document
Check
Articles

Found 3 Documents
Search

Implementasi Algoritma Hill Cipher dengan Matriks Kunci 3x3 dalam Mengamankan Data Teks Gusmana, Roman; Haryansyah, Haryansyah
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) Vol 7, No 4 (2024): Agustus 2024
Publisher : Program Studi Teknik Komputer, Fakultas Teknik. Universitas Serambi Mekkah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32672/jnkti.v7i4.7670

Abstract

Abstrak - Keamanan data teks menjadi sangat penting dalam era digital, terutama untuk melindungi informasi dari akses yang tidak sah. Penelitian ini membahas penerapan Algoritma Hill Cipher dengan matriks kunci 3x3 untuk enkripsi data teks. Algoritma ini dipilih karena kemampuannya yang kuat dan efisien dalam menjaga kerahasiaan data melalui operasi aljabar linear. Metode penelitian meliputi pembangkitan matriks kunci 3x3, proses enkripsi dan dekripsi data teks, serta evaluasi efektivitas algoritma melalui berbagai skenario pengujian. Hasil penelitian menunjukkan bahwa Algoritma Hill Cipher dengan matriks kunci 3x3 mampu menghasilkan enkripsi yang kuat dan proses yang efisien, meskipun pemilihan kunci yang tepat sangat penting untuk menjaga tingkat keamanan. Penelitian ini menyimpulkan bahwa Algoritma Hill Cipher dengan matriks kunci 3x3 adalah metode yang efektif untuk mengamankan data teks. Temuan ini diharapkan dapat mendukung pengembangan metode enkripsi yang lebih aman di masa depan dan memberikan wawasan berharga bagi praktisi keamanan informasi.Kata kunci: Hill Cipher, Enkripsi Matriks, Keamanan Data Abstract - Text data security has become crucial in the digital era, especially to protect information from unauthorized access. This study discusses the application of the Hill Cipher algorithm with a 3x3 key matrix for text data encryption. This algorithm is chosen for its strong and efficient capability in maintaining data confidentiality through linear algebra operations. The research method includes the generation of a 3x3 key matrix, the encryption and decryption processes of text data, and the evaluation of the algorithm's effectiveness through various testing scenarios. The results indicate that the Hill Cipher algorithm with a 3x3 key matrix can produce strong encryption and efficient processes, although the correct selection of the key is essential to maintain a high level of security. This study concludes that the Hill Cipher algorithm with a 3x3 key matrix is an effective method for securing text data. These findings are expected to support the development of more secure encryption methods in the future and provide valuable insights for information security practitioners.Keywords: Hill Cipher, Matrix Encryption, Data Security
IMPLEMENTATION OF DATA ENCRYPTION IN AN IOT-BASED HEART RATE AND OXYGEN SATURATION BLOOD DETECTION TOOL USING THE ELGAMAL METHOD Haryansyah, Haryansyah
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the problems with Internet of Things (IoT) devices today is data security. Especially regarding IoT devices that function to read personal or confidential data such as health-related data. This research focuses on discussing data security techniques through the process of encrypting sensor data that reads heart rate and blood oxygen saturation from an IoT device. This data is quite personal and confidential data because it concerns a person's medical history. The encryption method that will be used is the Elgamal method. The Elgamal method is an asymmetric encryption method, meaning the key used for encryption is different from the key used for decryption. This elgamal method uses a public key for encryption and a private key for decryption. The research results show that implementing data encryption using the Elgamal method to secure data on IoT devices was successful. Data security can prevent misuse of data by unauthorized parties.
Scheduling Uses the Blynk 2.0 Automations Feature for Effective Ornamental Fish Feeding Haryansyah, Haryansyah; Hadriansa, Hadriansa; Ardiansyah, Riswan
APTISI Transactions on Management (ATM) Vol 7 No 2 (2023): ATM (APTISI Transactions on Management: May)
Publisher : Pandawan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/atm.v7i2.2022

Abstract

Maintenance of ornamental fish can not be separated from the importance of regular feeding. Feeding which is still done manually will of course confiscate time and requires patience. However, the problem is when traveling that it doesn't Allows manual feeding. Matter this requires a system or tool that can provide fish feed automatically based on a schedule which is determined. One that can be used is with create Internet of Things (IoT)-based devices. There have been many developments in IoT-based devices gave birth to a variety of features that can be utilized in create automation tools in everyday life. Wrong one of which is a feature on the Blynk 2.0 application. on this application there is one feature that can be utilized in the process scheduling to perform one particular activity that very easy for users without having to be difficult to make a program commonly known as Automation feature. This feature will work continuously periodically according to a predetermined schedule. On research this will take advantage of these features in the manufacture of tools automatic fish feeding automation. scheduling feeding fish will utilize automation features at the same time can be monitored when the last feed was given. This study utilizes the NodeMCU ESP8266 as main controller and servo motor as driving tool feeder. The tool will be connected to the Blynk application via Wi-Fi network.