Claim Missing Document
Check
Articles

Found 21 Documents
Search
Journal : Journal of Artificial Intelligence and Engineering Applications (JAIEA)

DEVELOPMENT OF HYBRID ENCRYPTION METHOD USING AFFINE CIPHER, VIGENERE CIPHER, AND ELGAMAL ALGORITHM TO SECURE TEXT MESSAGES IN DATA COMMUNICATION SYSTEM RIFDAHTUL GHINAA SINAMBELA; Achmad Fauzi
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 2 (2023): February 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i2.154

Abstract

With the development of technological advances in this day and age, it definitely requires a security system on messages and data. The way to maintain the security of data, messages or information requires a branch of science in its application, one of which is the algorithm or cryptography method. In its application, it requires more than one stage of the security process, because data security can be done by combining methods in its security techniques. This research aims to develop encryption methods using Affine Cipher, Vigenere Cipher, and ElGamal Algorithm to secure text messages. Affine cipher, Vigenere cipher and ElGamal are cryptography that can encrypt and decrypt text messages. Encryption is changing the message or plaintext into an unreadable message or ciphertext, on the other hand, decryption changes the ciphertext or message that initially cannot be read into a message that can be read or plaintext back in its original form. The result of this research is the development stage by doing three encryption and decryption processes. For the first encryption process using Affine Chiper which produces the initial ciphertext, then re-encrypted using Vigenere Cipher, then the previous encryption results are carried out ElGamal encryption which produces the final ciphertext. Conversely, the decryption process is first on ElGamal, then Vigenere Cipher, and finally Affine Cipher whose decryption results in plaintext back in the form of the initial text message. So that by developing and combining three algorithm methods can increase the security of information and text messages.
Hybrid Cryptosystem Algorithm Vigenere Cipher and Base64 for Text Message Security Utilizing Least Significant Bit (LSB) Steganography as Insert into Image Raja Imanda Hakim Nasution; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.201

Abstract

Security message text is aspect important in modern communications for guard privacy and confidentiality information. Without exists guarantee security, of course just can raises risk when sensitive and valuable information are accessed by unauthorized persons responsible answer. Cryptography and steganography is two field used in a manner wide For reach objective this. Algorithm Vigenere Cipher and Base64 are method used for encryption message text and Least Significant Bit (LSB) steganography was used as method for insert message encrypted to in image. LSB makes use of the last bits from pixels image for keep information addition without bother image visual display in a manner significant. With utilise method here, order encrypted can hidden in a manner confidential in image that looks normal. This hybrid cryptosystem combine excess from third algorithm such, ie speed and effectiveness encryption use algorithm Vigenere Cipher as well ability Base64 characteristics, and levels security message more increase.
Implementation Of Affine Cipher Combination And Merkle Hellman On The Process Digital Image Security Muhammad Fadillah Azmi; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.204

Abstract

The use of image media information has several weaknesses, one of which is the ease with which it can be manipulated by irresponsible people. Efforts made in increasing the security of this image is cryptography, namely the science and art of maintaining the security and confidentiality of images. Cryptography is used so that the confidentiality of the image can be maintained, so that it is not known by others. In general, there are 2 (two) techniques for carrying out cryptographic processes, namely encryption and decryption. In this study, the encryption process was first carried out using the Affine Cipher algorithm and then continued with the Merkle Hellman algorithm, while the decryption was carried out first by Merkle Hellman and then decrypted again with the Affine Cipher. The results of this study indicate that applying the Affine Cipher and Merkle Hellman algorithms can secure images. At the end of this system is an image that is in the form of blur so that it is not known and not understood by others. That way people who are not entitled cannot understand from the image.
A Combination Of A Rail Fence Cipher And Merkle Hellman Algorithm For Digital Image Security Irwansyah; Achmad Fauzi; Siswan Syahputra
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.212

Abstract

Image is a combination of planes, points, lines and colors to create a physical or human object. Images can be in the form of 2-dimensional images, such as photographs and paintings. 3-dimensional image like a statue. The use of image media information has several weaknesses, one of which is the ease with which it can be manipulated by certain parties with the help of increasingly developing technology. In this study, the Rail Fence Cipher and Merkle Hellman methods were applied which aimed to obtain a stronger cipher by utilizing two key levels where an asymmetric algorithm was used to protect the symmetric key. The asymmetric algorithm used is Merkle Hellman and the symmetrical algorithm used is Rail Fence Cipher. The results of this study indicate that applying the Rail Fence Cipher and Merkle Hellman algorithms can secure image files and secure keys for data integrity. Encryption and description processing time is affected by the size and resolution of the image file.
Digital Image Security Implementation With Uses Super Encryption Algorithm Myszkowski And The Algorithm Paillier Cryptosystem EVAPIONA; Achmad Fauzi; Milli Alfhi Syari
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 3 No. 1 (2023): October 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v3i1.262

Abstract

This study aims to implement digital image security by applying two encryption algorithms, namely the Myszkowski algorithm and the Paillier Cryptosystem algorithm. Digital images are a very important form of data and are used frequently in a variety of applications, so protecting their security is a major concern. The encryption method proposed in this study uses a combination of the Myszkowski algorithm to randomize image pixels and the Paillier Cryptosystem algorithm to perform symmetric key encryption. At the experimental stage, qualitative and quantitative analysis was carried out on the performance of the encryption implemented on digital images. Testing is carried out by comparing the level of security and encryption speed of the two algorithms used. In addition, size analysis of encrypted images was also performed to evaluate the efficiency of the proposed system. The results of the study show that the use of a combination of the Myszkowski algorithm and the Paillier Cryptosystem algorithm provides a high level of security for digital images. In addition, the efficiency of this system has also been proven in producing efficient encryption image sizes, so that it can be implemented in image-based applications that require a higher level of security.
Application Of Super Encryption Using Rot 13 Algorithm Method and Algorithm Beaufort Cipher For Image Security Digital AYUDEVIAPERTIWI; Achmad Fauzi; Siswan Syahputra
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 3 No. 1 (2023): October 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v3i1.263

Abstract

Digital image security is becoming increasingly critical in today's digital era, where sensitive information and data are often stored in image form. Therefore, an effective and secure encryption method is needed to protect the integrity and confidentiality of digital images. This study aims to implement a stronger security approach by combining classic encryption methods, namely the ROT13 algorithm and the Beaufort Cipher algorithm which produces an encryption called "Super Encryption". In this study, first of all, the ROT13 encryption method will be applied to randomize digital image text by shifting characters as far as 13 positions in the alphabet. Then, the Beaufort Cipher algorithm will be used to apply additional encryption to the digital image, which involves using the key as input in the encryption process. The results of this study indicate that the Super Encryption method which combines the ROT13 and Beaufort Cipher algorithms provides a higher level of security compared to using each method separately. Security testing and vulnerability analysis show that the combination of these two algorithms produces digital images that are more difficult to decrypt by commonly used decryption attacks.
Grouping Number of Library Members For Determining the Location of Socialization Using Clustering Method Sella Dwi Pratiwi; Achmad Fauzi; I Gusti Prahmana
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 3 No. 1 (2023): October 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v3i1.270

Abstract

The high use of smartphones at this time led to a decline in public interest in reading books in the library directly. Especially students and students. This is certainly a problem for the Langkat Regency Archives and Libraries Office. Socialization is needed to increase efforts to read interest in the community. The right socialization location must have several criteria so that the socialization carried out is right on target. The existence of a database for each member of the library will facilitate the location selection process. Data mining techniques can classify the number of library members based on the results of large data analysis into information in the form of patterns. The clustering method is a method in data mining that can analyze data with the aim of grouping data based on the same characteristics. The K-Means algorithm is a simple algorithm for classifying a large number of objects with certain attributes into clusters which are usually used in data mining.
Clustering Disease on Settlements Inhabitant In place seedy With Use Clustering Method Ruine Buana Br Sitepu; Achmad Fauzi; Rusmin Saragih
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 3 No. 1 (2023): October 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v3i1.275

Abstract

Residents living in slum areas often face serious problems related to public health, where the prevalence of disease tends to be high and its spread is difficult to control. The impact of the formation of slums for the community is that safety is threatened, health deteriorates, and social conditions worsen, causing many diseases for people living in slums. Therefore, this study aims to identify patterns and clusters of diseases that exist in residential areas in slums Binjai city using clustering method. The K-Means Algorithm clustering method was chosen because it is able to group data based on similar characteristics, so that it can help identify diseases in a more focused and efficient manner, using the MATLAB application is also very appropriate in this problem so that it can produce output from data mining that can be used in decision making. future decisions. By utilizing the data mining process using the clustering method, clustering can be a problem of grouping diseases in slum settlements. Based on the results of trials with 20 sample data conducted with MATLAB obtained in cluster 1 DHF cases with high slums, Cluster 2 cases of vomiting with moderate slums and cluster 3 cases of diarrhea with moderate slums. The results of this study are expected to provide in-depth insight into disease patterns and clusters in residential areas in slums.
Diagnosis of Baby Blues Syndrome sing the Certainty Factor Method (Case Study: FULL BETHESDA Hospital) Sulisni; Achmad Fauzi; Suci Ramadani
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 3 No. 1 (2023): October 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v3i1.289

Abstract

Baby blues syndrome is a psychological disorder experienced by women after giving birth, such as feeling excessively upset and sad, and tired for no apparent reason. About 80% of women who have just given birth will experience Baby blues Syndrome, if this continues and is prolonged it will be very dangerous for the health of the mother and baby. From the problems above, the hospital needs to have an additional system that can help make it easier for the medical team to speed up handlers in analyzing and diagnosing Baby blues Syndrome suffered by patients using the certainty factor method. The purpose of this research is to build an expert system for diagnosing the symptoms of Baby blues syndrome using the certainty factor method. Based on the results of the CF calculation, the highest score is the type of baby blues syndrome with a value of 0.9602 or 96.02%. From the results obtained, the system identified that the patient had a type of baby blues syndrome.
Application Of The Ahp Method In Decision Support System For Security Recruitment Agung Kurniawan; Achmad Fauzi; Siswan Syahputra
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 3 No. 1 (2023): October 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v3i1.312

Abstract

PT Perkebunan Nusantara II (PTPN II) Sei Semayang, a state-owned enterprise (BUMN) engaged in palm oil and sugarcane production. Security officers play a crucial role in maintaining the company's security and productivity. Currently, the security officer recruitment process remains conventional, relying on subjective assessments based on several criteria. The aim of this study is to introduce a more structured, transparent, and objective approach to security officer recruitment. By implementing the Analytic Hierarchy Process (AHP) method, decisions in selecting prospective security officers can be made based on predetermined criterion weights. AHP enables decision-makers to identify, compare, and prioritize relevant criteria, addressing the complexity of selecting candidates who fit the established criteria. Through this approach, the study seeks to enhance efficiency and effectiveness in the security officer selection process, reduce the risk of errors in candidate selection, and improve overall company performance and security. It is hoped that the application of the AHP method in the decision support system for security officer recruitment at PTPN II Sei Semayang will assist the company in optimizing the selection process and supporting more data-driven decision-making.
Co-Authors Ade Rahayu Ade Syahputri Ade Syahputri Adelia Ramadani Agung Kurniawan Agus Sapitri, Liana Aji Tyo Syahputra Al Boy In Andre Anggi Meliana Br Hutasoit Arianta Bangun Arnes Sembiring Arnes Sembiring Asrul Reza Aulia Annisa Br Bangun AYUDEVIAPERTIWI Br Bangun, Tiara Buaton, Relita Budi Serasi Ginting Budi Serasi Ginting Chintya Dwi Putri Br. Ginting Cici Armayani Cristin Adelianan Br PA Deli Alvinda Denny Prayuda Putra Deny Jollyta Deri Kurniawan Dian Widodo Diki Kurniadi Diky Jaswa Dilla Sillfani Dimas Dimas Dimas EVAPIONA Fatmaira, Zira Feni Yasari Br Surbakti Fira Dwi Yanti Firliansyah, Aulia Fitri Handayani GOESTI MESKANA PELAWI PELAWI Gultom, Imeldawaty Hakim, Azizhil Hermansyah Sembiring Hermansyah Sembiring Hermansyah Sembiring Hermansyah Sembiring Hidayatullah Hidayatullah I Gusti Prahmana Ihsan Wibowo Zakti Iis Joice Susanti Marpaung Irwansyah Josi Maduri Kadim, Lina Arliana Nur Khair, Husnul Layla Mutiara Hasibuan Lina Arliana Magdalena Simajuntak Magdalena Simanjuntak Mega Ayu Ningrum Melda Pita Uli Sitompul Meliala, Evan Syahputra Mili Alfhi Syari Mill alfisyahri Mita Auva Muhammad Al Kahfi Muhammad Ali Imran Muhammad Fadillah Azmi Muhammad Haris N Novriyenni Nabil Fuadi Nezha Febriyan Novi Yunanda Putri Novriyenni - Nurhayati Pakpahan, Victor Maruli Pardede, Akim Manaor Hara Pasaribu, Tioria Rahayu, Rizka Putri Raja Imanda Hakim Nasution Ramanda, Dika Rani Rianda Br Ginting Ranti, Dwi Ratna Cantika Renika Ayuni RIFDAHTUL GHINAA SINAMBELA Riza Maria Ulfa Br Matondang Riza Maria Ulfa Br Mtd Rizka Putri Rahayu Rizka Putri Rahayu Rizka Putri Rahayu Rizki Oktavinus Tarigan Ronauli Silaban Ruine Buana Br Sitepu Rusmin Saragih, Rusmin Safna Safitri Salsabilla, Nur Sella Dwi Pratiwi Sembiring, Hermansyah Septian, Refli Sihombing, Anton Simanjuntak, Magdalena Siswan Syahputra Siswan Syahputra Sri Defriani Br Sembiring Sri Dewi Novita Sri Melisa suci ramadani Sulaiman Sulisni Susilawati Susilawati Syari, Milli Alfhi Winda Sari Windy Maulianda Yani Maulita Yekolya Anatesya Yusfrizal Yusfrizal Yustika Septiani Muzahardin Yustika Septiani Muzahardin Zhya Anggraini Zidan Hafiz