Claim Missing Document
Check
Articles

Found 9 Documents
Search
Journal : Mathematical Sciences and Applications Journal

Aplikasi Modifikasi Algoritma Vigenere Cipher dan Hill Cipher Menggunakan Konversi Suhu Aurillya Queency; Sisilia Sylviani
Mathematical Sciences and Applications Journal Vol. 4 No. 1 (2023): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v4i1.28858

Abstract

Cryptography is a method used to maintain the confidentiality of messages and data. Modifications or combinations of algorithms can be made to make the process of cracking secret messages more difficult than just one algorithm. This research aims to apply a combination of modified Vigenere Cipher algorithm, modified Hill Cipher algorithm, and temperature conversion equations to maintain a message’s confidentiality. By determining one plaintext and the required keys, the encryption and decryption process uses a modified Vigenere Cipher algorithm, a modified Hill Cipher algorithm, and all temperature conversion equations. The results obtained in the encryption process of one plaintext are 12 different ciphertexts according to the temperature conversion equation used. Moreover, the results obtained in the decryption process of 12 different ciphertexts are the original plaintext.
Implementasi Algoritma RSA (Rivest-Shamir-Adleman) pada Kriptografi Klasik Muhammad Zaky Zachary; Sisilia Sylviani; Edi Kurniadi
Mathematical Sciences and Applications Journal Vol. 4 No. 2 (2024): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v4i2.28863

Abstract

The implementation of the RSA (Rivest-Shamir-Adleman) cryptography algorithm, which is one of the most commonly used public-key cryptography algorithms. RSA provides high security and is widely used in information security applications such as data encryption, digital signature generation, and key exchange. This research documents the step-by-step implementation process of the RSA algorithm in classical cryptography, including key generation, data encryption, and decryption, leading to the generation of encryption and decryption tables for a specific key.
Implementasi Matriks Skew-symmetric dalam Metode Kriptografi Affine-Hill Cipher Putri Nisa Pratiwi; Sisilia Sylviani
Mathematical Sciences and Applications Journal Vol. 4 No. 1 (2023): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v4i1.28864

Abstract

The concept of cryptography is widely used to reduce data security threats along with developments in information technology. Affine Cipher is an example of classic cryptography that utilizes modular operations and shifts on characters. On the other hand, Hill Cipher method is more dependent on matrix operations. The combination of the two methods, Affine-Hill Cipher, creates a more complex and superior method in terms of security. In this research, we utilize a square skew-symmetric matrix with an order corresponds to the secret key to construct the key matrix. The encryption and decryption processes are carried out using the Affine-Hill Cipher and adding the key exchange concept into the algorithm. The results indicate that this algorithm’s complexity can effectively reduce data security threats.
Pengamanan Nama Customer Shopee melalui Kombinasi Algoritma Hill Cipher Modifikasi dan Rail Fence Cipher Laily Wadil Muqadas; Sisilia Sylviani; Edi Kurniadi
Mathematical Sciences and Applications Journal Vol. 4 No. 2 (2024): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v4i2.28865

Abstract

Science and technology development has made human activities turn into cyberspace activities, one of which is buying and selling. Shopee is one of the e-commerce platforms available. As an online-based platform, Shopee certainly stores lots of user data. Since August 1st, 2022, Shopee has made a policy regarding user data security by censoring the buyer’s name and phone number in the ordering process. This research discusses one way to secure buyer data through cryptography with the concept of super encryption. This concept itself combines more than one encryption method with the goal to create ciphertext that is difficult to solve. The chosen combination for this research is the modified Hill Cipher algorithm before proceeding with the Rail Fence Cipher encryption. Result obtained in this research is possible to be applied in Shopee buyer data security system, seen from the difficulty level of the ciphertext decryption.
Penerapan Metode Content-Based Filtering pada Sistem Rekomendasi Tegar Ridwansyah; Betty Subartini; Sisilia Sylviani
Mathematical Sciences and Applications Journal Vol. 4 No. 2 (2024): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v4i2.32136

Abstract

Content-based filtering is one of the recommendation system methods that provides recommendations based on the similarity of attributes or items preferred by users. Several researchers in various fields have used content-based filtering in their research. This paper describes several studies in various fields using content-based filtering to solve the problems faced in their research. From these studies, the researchers revealed that the use of content-based filtering can produce simple and efficient recommendations and its application can increase the revenue of a business.
Aplikasi Algoritma Euclidean dalam Produksi Jagung di Pulau Jawa Setiawan, Ade Ripki; Kurniadi, Edi; Triska, Anita; Sylviani, Sisilia
Mathematical Sciences and Applications Journal Vol. 5 No. 1 (2024): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v5i1.38080

Abstract

Corn farming on the island of Java plays a crucial role in meeting the nation's food needs. However, variations in land conditions across provinces in Java result in differing production levels. This disparity affects the supply of corn in the market, and the selling price often does not align with farmers' expectations. Therefore, this article aims to determine the optimal timing for distributing corn, particularly on the island of Java, using the Euclidean algorithm. The Euclidean algorithm is used to calculate the greatest common divisor (gcd), which in turn is applied to determine the least common multiple (lcm). The lcm results can serve as a reference for identifying the best time to sell corn to prevent price declines. Additionally, a comparison of production levels across provinces is presented to help corn farmers understand when and where to distribute their produce to achieve maximum profit.
Metode Pemecahan Sistem Kongruensi Linear Budiman, Muhammad Arief; Kurniadi, Edi; Sukono, Sukono; Sylviani, Sisilia
Mathematical Sciences and Applications Journal Vol. 5 No. 1 (2024): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v5i1.38085

Abstract

A linear congruence system is a system that has more than one linear congruence. The solution of linear congruence systems has an important role in the concept of number theory. Various ways of settlement can be applied in different cases. This study discusses the problem solving of linear congruence systems with the Chinese Remainder Theorem, Intelligent Inspection Algorithm type-I and II and its application.
Aplikasi Teorema Fermat dalam Kriptografi Al Affiani, Hanifah; Johansyah, Muhammad Deni; Sylviani, Sisilia
Mathematical Sciences and Applications Journal Vol. 5 No. 1 (2024): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v5i1.38094

Abstract

Cryptography is the science and technique of disguising messages in a unique form so that they can only be read and processed by the intended recipient. Many studies have been conducted to develop algorithms that can be used to encode information in a way that is difficult to crack and cannot be recognized by adversaries. One example of the most popular algorithms is the Rivest-Shamir-Adleman (RSA), which uses different key pairs for the encryption and decryption process of messages, usually known as the public key and private key. In public key-based encryption systems such as RSA, Fermat's theorem plays an important role because it enables modular exponential calculations on key pairs to be performed efficiently and provides a security basis for the RSA algorithm. Thus, this research aims to describe the application of Fermat's theorem in the RSA algorithm, where the encryption and decryption process involves modular exponentiation with public and private keys. As a result, using the properties of modular exponentiation in Fermat's theorem, this system ensures information remains secure from attacks by third parties without access to the private key, even if they succeed in intercepting encrypted messages. It can be concluded that Fermat's theorem plays a crucial role in establishing a solid mathematical foundation for creating secure and efficient cryptographic systems.
Kombinasi Algoritma Sandi Caesar dan Algoritma RSA untuk Pengamanan Pesan Teks Alamsyah, Alifa Raida; Kurniadi, Edi; Triska, Anita; Sylviani, Sisilia
Mathematical Sciences and Applications Journal Vol. 5 No. 1 (2024): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v5i1.38104

Abstract

This article combines a simple cryptographic algorithm, Caesar Cipher, with a more complex algorithm, RSA, in order to increase the security of encrypted text messages. Text messages are first encrypted with the Caesar Cipher algorithm, which is then re-encrypted using the RSA algorithm. By utilizing number theory, specifically about integers and modulo arithmetic in the RSA algorithm, a public key and a secret key are obtained that will increase the security of the encryption process in this article. Due to the increased security of the text message, uninvolved parties cannot read the actual text message.