Claim Missing Document
Check
Articles

Found 6 Documents
Search
Journal : Indonesian Journal on Computing (Indo-JC)

Modifikasi Headstega berdasarkan Penyisipan Karakter Hasmawati Hasmawati; Ari Moesriami Barmawi
Indonesia Journal on Computing (Indo-JC) Vol. 2 No. 1 (2017): Maret, 2017
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/INDOJC.2017.2.1.145

Abstract

AbstractHead steganography or Headstega is one of noiseless steganography paradigm, or Nostega.This method utilizes the email header as a media of  message concealment. There are several problems that can be enhanced in Headstega, i.e. low embedding capacity and high level of suspicion. Modified Headstega based on Character Hiding uses a combination of consonant vowel to embed the secret messages into email address. The messages embedding process using four consonant vowel combination that represented one character in Indonesian language.  From the experiments conducted, the results obtained that the Modified Headstega has a better performance than the Original Headstega in term of embedding capacity and also in suspicion level. Keyword : Steganography, Nostega, Headstega, Character Hiding
Grid-based Image Encryption using Code-based Cryptography Dian Anggoro Putro Bhagaskoro; Ari Moesriami Barmawi
Indonesia Journal on Computing (Indo-JC) Vol. 5 No. 3 (2020): December, 2020
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2020.5.3.493

Abstract

Recently, image is frequently sent or exchanged electronically, such that image security is important. A method for securing images is using RSA. However, RSA needs more time for securing an image. For overcoming the RSA problem, McEliece Cryptosystem is introduced to grid-based image encryption. The image is divided into blocks and each block is divided into grids, then finally McEliece Cryptosystem is applied to the pixels in the grids. Based on the experiment’s result, it was proven that the execution time of the proposed method is less than the previous one, while maintaining the security. Keywords: McEliece Cryptosystem, RSA, Image Encryption, Image Decryption, Grid 
Column-Level Database Encryption Using Rijndael Algorithm and Dynamic Key on Learning Management System Ariva Syam Mursalat; Ari Moesriami Barmawi; Prasti Eko Yunanto
Indonesia Journal on Computing (Indo-JC) Vol. 7 No. 1 (2022): April, 2022
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2022.7.1.609

Abstract

The course management system’s goal is to help learning activities. The system helps tomanage tasks, the grading process, and user communications. To avoid unauthorized dataaccess, the course management system needs a mechanism to protect the password that isused in the system’s login process. Database encryption using Rijndael algorithm is proposedby Francis Onodueze et al. to protect the data. A key is needed for the encryption process,and the key has to be kept secret. Thus, when the key is static, it is vulnerable against keyguessing attacks. To overcome the static key’s drawback, a dynamic key generation usingHash Messages Authentication Code - Deterministic Random Bit Generator (HMAC-DRBG)is proposed because it can generate keys periodically. Based on the evaluation, the probabilityof success key guessing attack using the proposed method is less than using the previousmethod, while the time complexity of those methods is similar.
Securing KTP Data Using QR Code Modification and Elliptic Curve Cryptography Rakha Aditya Nugraha; Ari Moesriami Barmawi
Indonesia Journal on Computing (Indo-JC) Vol. 9 No. 1 (2024): April, 2024
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2024.9.1.909

Abstract

Identity Cards (KTP) are essential for Indonesian people. KTP contains personal information, such as National Identity Number (NIK), Name, Address, Gender, etc. Since KTP has essential data and is still printed conventionally, there is a vulnerability if the KTP is lost, and the owner's data is disclosed so that if an irresponsible person finds it, the data can be used for impersonating the owner. In the previous method proposed by Haque et al., [1], the data was stored in a QR Code. However, there was no verification method to legitimize the original owner, and the system did not have a login feature. To overcome the weakness of Haque et al., method [1], the owner's NIK is encrypted using the Elliptic Curve El-Gamal (ECEG) and further signed using ECDSA by the owners before storing it in the QR Code. For obtaining the owner's data in the database, the verification process should be done after the QR Code is scanned. Using the proposed method, the probability of success for a guessing attack is 1 / (n-1). Meanwhile, the probability of success for an impersonation attack is 1 / (q1 * q2 * l).
Grid-based Image Encryption using Code-based Cryptography Bhagaskoro, Dian Anggoro Putro; Barmawi, Ari Moesriami
Indonesian Journal on Computing (Indo-JC) Vol. 5 No. 3 (2020): December, 2020
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2020.5.3.493

Abstract

Recently, image is frequently sent or exchanged electronically, such that image security is important. A method for securing images is using RSA. However, RSA needs more time for securing an image. For overcoming the RSA problem, McEliece Cryptosystem is introduced to grid-based image encryption. The image is divided into blocks and each block is divided into grids, then finally McEliece Cryptosystem is applied to the pixels in the grids. Based on the experiment’s result, it was proven that the execution time of the proposed method is less than the previous one, while maintaining the security. Keywords: McEliece Cryptosystem, RSA, Image Encryption, Image Decryption, Grid 
Securing KTP Data Using QR Code Modification and Elliptic Curve Cryptography Nugraha, Rakha Aditya; Barmawi, Ari Moesriami
Indonesian Journal on Computing (Indo-JC) Vol. 9 No. 1 (2024): April, 2024
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2024.9.1.909

Abstract

Identity Cards (KTP) are essential for Indonesian people. KTP contains personal information, such as National Identity Number (NIK), Name, Address, Gender, etc. Since KTP has essential data and is still printed conventionally, there is a vulnerability if the KTP is lost, and the owner's data is disclosed so that if an irresponsible person finds it, the data can be used for impersonating the owner. In the previous method proposed by Haque et al., [1], the data was stored in a QR Code. However, there was no verification method to legitimize the original owner, and the system did not have a login feature. To overcome the weakness of Haque et al., method [1], the owner's NIK is encrypted using the Elliptic Curve El-Gamal (ECEG) and further signed using ECDSA by the owners before storing it in the QR Code. For obtaining the owner's data in the database, the verification process should be done after the QR Code is scanned. Using the proposed method, the probability of success for a guessing attack is 1 / (n-1). Meanwhile, the probability of success for an impersonation attack is 1 / (q1 * q2 * l).