Claim Missing Document
Check
Articles

Found 32 Documents
Search

Implementation Of A Combination Of Stream Cipher Algorithm And Rotate 13 For Data Security Ikhsan Tri Mukrozi; Sapri Sapri; Abdussalam Al Akbar
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 1 (2024): June
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i1.1727

Abstract

The issue of data security and confidentiality is one of the important aspects of data, messages and information. Stream Cipher is often referred to as a stream cipher. The advantage of this method is that it is relatively faster in the encryption-decryption process and is also not limited by the length of the plaintext. ROT13 is a substitution cipher encryption by shifting characters forward 13 times, counting 1 character in front of it, and shifting characters based on the order of characters in the ASCII table. By combining the Stream Cipher and ROT13 algorithms, it produces a method that can provide a better level of security compared to the application of each of these methods separately. The results of the analysis and testing carried out using different decryption keys resulted in the ciphertext cannot be returned which shows normal things because the method used is symmetrical cryptography so that the decryption process can only be done using the same key as the key during decryption.
Implementation Of Network Device Monitoring System Using Snmp Protocol With Email Notification At Smk N 2 Seluma Pauzan Sakti; Sapri Sapri; Abdussalam Al Akbar
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 1 (2024): June
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i1.1732

Abstract

SMK N 2 Seluma currently has a network and is also connected to the internet network, the computer network is used for teaching and learning activities for students and the work of teachers and education staff, the SMK N 2 Seluma computer network still often occurs disturbances in devices that support networks such as access points (often laptop users connect for a long time and even cannot connect to the network). This research aims to monitor network devices using the SNMP protocol on the SMK N 2 Seluma computer network. The research used an experimental method. In monitoring devices on the SMK N 2 Seluma computer network using the SNMP protocol found in the Nagios application. Nagios monitors devices on the network such as connected or not connected, device memory, device storage (HDD) and other monitoring. In monitoring devices on the network Nagios works well, which can monitor according to the script configured on the main Nagios Core system. For notifications will be sent via email that has been set (admin email) in the form of device down conditions. With the monitoring system using the SNMP protocol, it will make it easier for admins to perform maintenance on the network.