Claim Missing Document
Check
Articles

Found 33 Documents
Search

Implementasi Algoritma Ecc Dan Paillier Pada Steganografi Audio Dengan Menggunakan Metode Least Significant Bit (LSB) Itaqullah Putra Nalramus, Agdelssa; Adi Prabowo, Wahyu; Yuniati, Trihastuti
eProceedings of Engineering Vol. 12 No. 4 (2025): Agustus 2025
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Era digital mentransformasi cara manusia berkomunikasi, berbisnis, dan menyimpan informasi. Pertukaran data digital kian masif, membawa kemudahansekaligus memicu kecemasan terkait keamanan data. Kebocoran data dan penyalahgunaan informasi menjadi ancaman nyata yang dapat mengakibatkan kerugian finansial, reputasi, bahkan pelanggaran privasi. Internet telah menjadisaluran komunikasi yang paling disukai saat ini, di mana hampir semua dokumen seperti teks, gambar, audio, atau video, ditransmisikan melalui internet. Hal tersebut menunjukkan bahwa keamanan dalam mentransfer data melalui internetmenjadi semakin penting, terutama dalam mengamankan informasi rahasia dari pihak yang tidak berwenang. Terdapat beberapa metode untuk mengamankan data pesan rahasia, seperti Teknik steganografi dan Teknik Kriptografi. PadaTeknik kriptografi terdapat banyak algoritma yang tersedia, pada penelitian ini penulis menggunakan double algoritma kriptografi, yaitu Elliptic Curve Cryptography (ECC) dan Paillier. Sedangkan untuk Teknik steganografi penulismenggunakan metode Least Significant Bit (LSB) untuk teknik penyembunyian pesan kedalam suatu media, media yang digunakan pada penelitian ini yaitu audio. Untuk mengecek keaslian data juga menggunakan Message Digest 5 (MD5).Kata kunci— Keamanan Data, Elliptic Curve Cryptography (ECC), Paillier, Least Significant Bit (LSB), Audio
Perancangan Sistem keamanan Database Menggunakan Super Encryption dengan Algoritma Kriptografi Diffie Hellman dan Blowfish Andini Putri, Septya; Adi Prabowo, Wahyu; Yuniati, Trihastuti
eProceedings of Engineering Vol. 12 No. 4 (2025): Agustus 2025
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Meningkatnya penggunaan data digital dalamberbagai sektor menuntut sistem keamanan basis data yangmampu melindungi informasi sensitif dari ancaman siber.Penelitian ini bertujuan merancang sistem keamanan databaseberbasis web menggunakan pendekatan super encryption, yaitukombinasi algoritma Diffie Hellman untuk pertukaran kuncidan Blowfish untuk proses enkripsi serta dekripsi data. Sistemdikembangkan menggunakan PHP native dan MySQL sertadiimplementasikan pada web hosting daring. Hasil pengujianmenunjukkan bahwa sistem mampu mengenkripsi danmendekripsi data dengan baik secara manual, serta efektifmencegah serangan SQL Injection karena data tersimpandalam bentuk ciphertext. Dengan demikian, sistem yangdirancang terbukti efektif dalam meningkatkan keamanan datapada basis data berbasis web.Kata kunci— kriptografi, database, super encryption,blowfish, diffie hellman
Developing Compliant Audit Information System for Information Security Index: A Study on Enhancing Institutional and Organizational Audits using Web-based Technology and ISO 25010:2011 Total Quality of Use Evaluation Prabowo, Wahyu Adi
JOIV : International Journal on Informatics Visualization Vol 8, No 1 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.1.1845

Abstract

This study aimed to develop the KAMI 4.1 Index system application based on web application technology to provide a platform for controlled audit implementation and improve data management. The primary goals were to independently assess organizations' ability to obtain ISO 27001:2013 and enhance the audit process's effectiveness and efficiency. The research utilized web application technologies as materials. It employed a systematic approach, focusing on developing a web-based application using the waterfall model's stages of communication, planning, modeling, construction, and deployment. The resulting KAMI 4.1 Index system application introduced a new and efficient platform for controlled audit implementation, featuring an improved user experience and enhanced ease of use by incorporating existing audit calculations from the KAMI 4.1 index. Evaluation based on the ISO 25010:2011 quality of use model yielded a high total quality of use rate of 81.45%, indicating a "very good" categorization. However, areas requiring further research and improvement were identified, including data security, content coverage, freedom from risk, and error tracking. The study also suggested exploring integration possibilities of the audit system with other ISO audit needs, such as a quality assurance system complying with ISO 9001. Further research is necessary to gather information about user criteria and needs in different organizational contexts, ensuring the audit application system meets their requirements. Overall, this research contributes to developing the KAMI 4.1 Index system application and highlights directions for further enhancement and exploration in controlled audit implementation and data management.