Claim Missing Document
Check
Articles

Super Encryption of Rabin Cryptosystem Algorithm and Paillier Cryptosystem Algorithm on Digital Image Security Process Ramanda, Dika; Achmad Fauzi; Pakpahan, Victor Maruli
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.659

Abstract

Technological advances have given rise to the need for data protection, especially digital images, which are vulnerable to misuse. This research proposes a super encryption method that combines two cryptographic algorithms, namely Rabin Cryptosystem and Paillier Cryptosystem, to increase digital image security. Rabin's algorithm does not have homomorphism, so it is vulnerable to factorization attacks if the prime numbers used are too small. Meanwhile, the Paillier algorithm has homomorphism properties which allow arithmetic operations to be carried out directly on the ciphertext without decryption. By combining these two algorithms, this research aims to create a stronger and more efficient encryption method, and analyze its performance in terms of computational efficiency and complexity. It is hoped that the research results can improve the security and privacy of digital data, especially in the context of digital images.
Digital Image Security Analysis using Hill Cipher and AES Algorithm Ranti, Dwi; Achmad Fauzi; Sitompul, Melda Pita Uli
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.665

Abstract

In today's digital era, digital image exchange has become very common in various industries, but this also increases security risks such as counterfeiting, image manipulation, and information theft. To protect the confidentiality of information in digital images, encryption is a fairly effective method. Hill Cipher, as a classic cryptographic method, offers matrix-based encryption, while Advanced Encryption Standard (AES) is known for its high level of security and efficiency. By combining Hill Cipher and AES, encryption systems can leverage the strengths of classic and modern cryptography together, providing an additional layer of protection that strengthens the security of digital data and reduces vulnerabilities that may exist in each method separately. This approach provides a more comprehensive solution for maintaining the confidentiality of digital images in the context of evolving security threats.
Diagnosa Penyakit Kanker Prostat menggunakan Metode Certainty Factor Nezha Febriyan; Achmad Fauzi; Victor Maruli Pakpahan
Mars : Jurnal Teknik Mesin, Industri, Elektro Dan Ilmu Komputer Vol. 2 No. 5 (2024): Oktober : Mars : Jurnal Teknik Mesin, Industri, Elektro Dan Ilmu Komputer
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/mars.v2i5.341

Abstract

The rapid development of information technology affects the way people access information, including in the health sector. Prostate cancer, as one of the most significant types of cancer in men, is often detected late due to lack of information and limited costs. To overcome this problem, a system is needed that is able to diagnose prostate cancer quickly, precisely, and accurately. This study aims to develop a web-based expert system using the Certainty Factor (CF) method to diagnose prostate cancer based on the symptoms that appear. The CF method was chosen because of its ability to determine the level of confidence in the facts or rules used in the diagnosis. This study uses data on symptoms and types of prostate cancer. The results of the study can help the public in recognizing prostate cancer symptoms early, with a high level of accuracy in diagnosis. This study is expected to make it easier for patients to make an early diagnosis and accelerate the treatment of prostate cancer.
SUPER ENKRIPSI DATA TEKS : KOMBINASI ALGORITMA AFFINE CIPHER, ELGAMAL, DAN RSA UNTUK PERLINDUNGAN OPTIMAL: Teknik Super Enkripsi pada Kriptografi Muhammad Al Kahfi; Mita Auva; Denny Prayuda Putra; Chintya Dwi Putri Br. Ginting; Achmad Fauzi
Jurnal Sistem Informasi Kaputama (JSIK) Vol. 9 No. 1 (2025): Volume 9, Nomor 1, Januari 2025
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jsik.v9i1.949

Abstract

Keamanan data telah menjadi perhatian utama, terutama untuk mencegah akses, manipulasi, dan pencurian data teks. Penelitian ini mengusulkan sebuah teknik enkripsi baru yang mengintegrasikan algoritma Affine Cipher, ElGamal, dan RSA. Pengakuan akan kekuatan masing-masing adalah dasar dari integrasi algoritma ini. Karena Affine Cipher mudah dioperasikan dan efisien pada tahap pertama proses enkripsi, maka algoritma ini dipilih. ElGamal dipilih untuk kriptografi kunci publik, yang terkenal untuk meningkatkan keamanan; RSA dipilih karena kemampuannya untuk menyediakan manajemen kunci yang aman dan melawan serangan brute force. Tiga fase adalah bagian dari metode enkripsi yang diusulkan. Affine Cipher mengenkripsi data teks terlebih dahulu; ElGamal meningkatkan keamanan kedua; dan yang terakhir, RSA meningkatkan perlindungan kunci. Penelitian ini berfokus pada investigasi kemanjuran dan kompleksitas keamanan algoritma. Penelitian ini diproyeksikan untuk memberikan solusi keamanan data teks yang dapat diterapkan untuk pemerintah, kesehatan, dan perbankan serta sektor lainnya.
PENERAPAN KOMBINASI ALGORITMA OTP DAN RSA PADA FILE GAMBAR Meliala, Evan Syahputra; Fira Dwi Yanti; Anggi Meliana Br Hutasoit; Sri Defriani Br Sembiring; Achmad Fauzi
Jurnal Sistem Informasi Kaputama (JSIK) Vol. 9 No. 1 (2025): Volume 9, Nomor 1, Januari 2025
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jsik.v9i1.955

Abstract

This study discusses the application of a combination of the One-Time Pad (OTP) and Rivest-Shamir-Adleman (RSA) algorithms to enhance data security in image files. The combination of these two algorithms offers higher security, with OTP used to encrypt image data with unique random keys, and RSA employed to securely encrypt the OTP key. This method leverages the strengths of each algorithm, namely OTP's mathematical security and RSA's key distribution capability. The results of the study indicate that this combination is effective in protecting image files from cryptographic threats, although challenges remain in terms of efficiency and compatibility with certain data formats. Keywords : Cryptography, OTP Algorithm, RSA Algorithm, Image file encryption, Data security, Hybrid encryption.
PENERAPAN SUPER ENKRIPSI HILL CIPHER DAN RSA UNTUK PENGAMANAN DATA FILE AUDIO MP3 Hakim, Azizhil; Zhya Anggraini; Dilla Sillfani; Renika Ayuni; Fauzi, Achmad
Jurnal Sistem Informasi Kaputama (JSIK) Vol. 9 No. 1 (2025): Volume 9, Nomor 1, Januari 2025
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jsik.v9i1.959

Abstract

Digital data security, especially audio files, is a major issue in the modern era, especially with the increasing risk of hacking and file tapping. To protect audio files such as MP3 format, this study suggests a combination of Hill Cipher and RSA algorithms for the Super Encryption method. Hill Cipher uses a linear matrix to encrypt data at high speed, while RSA uses a symmetric key created by Hill cipher to encrypt. The combination of these two algorithms produces a strong double layer of security to protect audio files. The layered encryption process uses Hill Cipher as the initial stage before using RSA for additional security. This super encryption is very good for maintaining data confidentiality. This study helps develop a digital data security system based on cryptography with a focus on audio files. This method can be used for various things, such as maintaining sensitive voice communications, maintaining important recordings, and creating applications based on audio data. However, further development can be done to improve the scalability and efficiency of this method, especially for large audio data files or data in the form of.
Penerapan Metode Clustering Untuk Mengetahui Kepatuhan Wajib Pajak Bumi Dan Bangunan Pada Desa Perkebunan Tanjung Keliling Ratna Cantika; Achmad Fauzi; Anton Sihombing
Bridge : Jurnal Publikasi Sistem Informasi dan Telekomunikasi Vol. 2 No. 4 (2024): Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/bridge.v2i4.242

Abstract

Land and Building Tax (PBB) is a type of area regulated by the government in determining the amount of tax for implementation and development as well as increasing the prosperity and well-being of the people. Based on taxpayer compliance data in Tanjung Keliling Plantation, the results of tests carried out using the Clustering algorithm can determine the variables of ownership area, hamlet name and payment level. Clusters 1,2,3 of 600 PBB taxpayer data, namely where cluster 1 has 166 data, can be grouped based on the Ownership Area of "500,001-600,000m2" with the Hamlet Name "Ujung Bangun" and the Payment Level "Quite Good". Cluster 2 consists of 196 data, which can be grouped based on ownership area "200,001-300,000m2" with the hamlet name "Karang Jati" and payment level "fairly good". And Cluster 3 with a total of 238 data, can be grouped based on the Ownership Area "400,001-500,000m2" with the Hamlet Name "Mojosari" and the Payment Level "Quite Good".
“Klasifikasi Citra Penyakit Gigi Menggunakan Metode K-Nearest Neighbor”. Sri Dewi Novita; Achmad Fauzi; Victor Maruli Pakpahan
Bridge : Jurnal Publikasi Sistem Informasi dan Telekomunikasi Vol. 2 No. 4 (2024): Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/bridge.v2i4.244

Abstract

Handling of dental disease problems requires that it be handled quickly and correctly, but not all teams of dental experts can carry out treatment quickly due to the lack of a team of dental experts who are in the workplace or hospital 24 hours a day. Apart from that, the public also has very little knowledge of information about dental disease, so that to treat dental disease, people have to consult a dentist. To classify images of dental disease, feature extraction is needed. Feature extraction is taking characteristics of an object that can describe the image. One example of image feature extraction used is Red, Green, Blue (RGB). This feature extraction is often used to identify or classify an image. Dental image data that will be used in the classification process are tooth abrasion, anterior crosbite, cavities and gingivitis. K-Nears Neigbor is the simplest data mining algorithm. The aim of this algorithm is to find the results of the closest distance classification for each object. In determining the distance, the data is initially divided into two parts, namely training data and testing data. After receiving the training data and testing data, the distance from each testing data (Equilidence Distance) to the training data is calculated. The K-Nearest Neighbors method can be applied to classify dental disease based on images of types of dental disease using Matlab software. As a result of the image data training process, 40 image data were input, training results obtained were 100%.
Implementasi Association Rule pada Sistem Rekomendasi Peningkatan Hasil Pertanian Menggunakan Metode Apriori: Studi Kasus: Dinas Pertanian dan Pangan Kab. Langkat Yekolya Anatesya; Achmad Fauzi; Rusmin Saragih
Bridge : Jurnal Publikasi Sistem Informasi dan Telekomunikasi Vol. 2 No. 4 (2024): Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/bridge.v2i4.245

Abstract

The rapid development of technology increases the need for effective and efficient information. Information that is not managed properly loses value, especially when large amounts of data are available, making conventional methods no longer adequate to analyze the potential of the data. Therefore, a system capable of analyzing, summarizing, and extracting data into useful information is required. The Department of Agriculture and Food Security, as an agency that handles food security, agriculture, animal husbandry, animal health, and fisheries, is responsible for supporting the increase in agricultural yields to meet the food needs of the population and encourage economic growth. To achieve this goal, the agency needs to utilize technology to process agricultural data quickly and accurately. The system built using the apriori method can analyze data efficiently and provide recommendations for increasing agricultural yields. Based on the test results, a support value of 9% and a confidence of 68% were obtained, with the rule If the crop is Cassava, then the production yield is 6000-8000 tons.
Co-Authors Ade Rahayu Ade Syahputri Ade Syahputri Adelia Ramadani Agung Kurniawan Agus Sapitri, Liana Aji Tyo Syahputra Al Boy In Andre Anggi Meliana Br Hutasoit Arianta Bangun Arnes Sembiring Arnes Sembiring Asrul Reza Aulia Annisa Br Bangun AYUDEVIAPERTIWI Br Bangun, Tiara Buaton, Relita Budi Serasi Ginting Budi Serasi Ginting Chintya Dwi Putri Br. Ginting Cici Armayani Cristin Adelianan Br PA Deli Alvinda Denny Prayuda Putra Deny Jollyta Deri Kurniawan Dian Widodo Diki Kurniadi Diky Jaswa Dilla Sillfani Dimas Dimas Dimas EVAPIONA Fatmaira, Zira Feni Yasari Br Surbakti Fira Dwi Yanti Firliansyah, Aulia Fitri Handayani GOESTI MESKANA PELAWI PELAWI Gultom, Imeldawaty Hakim, Azizhil Hermansyah Sembiring Hermansyah Sembiring Hermansyah Sembiring Hermansyah Sembiring Hidayatullah Hidayatullah I Gusti Prahmana Ihsan Wibowo Zakti Iis Joice Susanti Marpaung Irwansyah Josi Maduri Kadim, Lina Arliana Nur Khair, Husnul Layla Mutiara Hasibuan Lina Arliana Magdalena Simajuntak Magdalena Simanjuntak Mega Ayu Ningrum Melda Pita Uli Sitompul Meliala, Evan Syahputra Mili Alfhi Syari Mill alfisyahri Mita Auva Muhammad Al Kahfi Muhammad Ali Imran Muhammad Fadillah Azmi Muhammad Haris N Novriyenni Nabil Fuadi Nezha Febriyan Novi Yunanda Putri Novriyenni - Nurhayati Pakpahan, Victor Maruli Pardede, Akim Manaor Hara Pasaribu, Tioria Rahayu, Rizka Putri Raja Imanda Hakim Nasution Ramanda, Dika Rani Rianda Br Ginting Ranti, Dwi Ratna Cantika Renika Ayuni RIFDAHTUL GHINAA SINAMBELA Riza Maria Ulfa Br Matondang Riza Maria Ulfa Br Mtd Rizka Putri Rahayu Rizka Putri Rahayu Rizka Putri Rahayu Rizki Oktavinus Tarigan Ronauli Silaban Ruine Buana Br Sitepu Rusmin Saragih, Rusmin Safna Safitri Salsabilla, Nur Sella Dwi Pratiwi Sembiring, Hermansyah Septian, Refli Sihombing, Anton Simanjuntak, Magdalena Siswan Syahputra Siswan Syahputra Sri Defriani Br Sembiring Sri Dewi Novita Sri Melisa suci ramadani Sulaiman Sulisni Susilawati Susilawati Syari, Milli Alfhi Winda Sari Windy Maulianda Yani Maulita Yekolya Anatesya Yusfrizal Yusfrizal Yustika Septiani Muzahardin Yustika Septiani Muzahardin Zhya Anggraini Zidan Hafiz