Muhammad Khudzaifah
Unknown Affiliation

Published : 24 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 24 Documents
Search

Implementasi Algoritma Rivest Shamir Adleman atas Ring Dedekind Ladunniyyah, Zakiyya Dzul; Khudzaifah, Muhammad; Herawati, Erna
Jurnal Riset Mahasiswa Matematika Vol 3, No 4 (2024): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v3i4.25407

Abstract

The issue of security and confidentiality of data or messages is very important so efforts are needed to maintain the security and confidentiality of messages, one of which is with cryptography. This study aims to determine the implementation of the RSA algorithm over the Dedekind ring to secure text messages. This implementation is done by modifying the key formation, encryption, and decryption processes of the RSA cryptographic algorithm to match the Dedekind ring used. The research stage carried out is to form a key on the RSA algorithm over the Dedekind ring, then construct an encryption and decryption algorithm to secure messages with RSA over the Dedekind ring. From this research, results were obtained in the form of an RSA message encoding algorithm in accordance with the Dedekind ring where the Dedekind ring was used in the key formation process. Furthermore, the encryption and decryption process is carried out with the RSA algorithm. The conclusion of this study is that the implementation of the RSA algorithm over the Dedekind ring can produce a wider public key where the public key used is any member number of the set of maximal ideal products on the Dedekind ring.
Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia Ludyawati, Ludyawati; Khudzaifah, Muhammad; Herawati, erna
Jurnal Riset Mahasiswa Matematika Vol 2, No 6 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i6.22041

Abstract

Vigènere Cipher is a symmetric cryptographic algorithm that uses the same type of key in the encryption and decryption process. The security of the Vigènere Cipher method lies in the modulo calculation used. ElGamal is an asymmetric cryptographic algorithm that uses two different types of keys in the encryption and decryption process. The security of the ElGamal algorithm lies in the complexity of calculating large prime numbers. The Vigènere Cipher and ElGamal have their advantages and disadvantages. The researchers are interested in combining the advantages of the two methods. In this study, two locks were carried out in the encryption and decryption process. The encryption process uses a public key and the decryption process uses a public key  and a secret key . The key used comes from key formation using the ElGamal algorithm. The key security formed from the ElGamal algorithm lies in the large prime , the primitive root  of the prime number , and the random integer  which comes from the last three digits of Student Number. The conclusion of this study is that the combination of the Vigènere Cipher and ElGamal methods can increase the security of  secret messages because it produces a ciphertext with twice the size ) of  the original message.
Membangun Super Enkripsi untuk Mengamankan Pesan Agustina, Laura; Sujarwo, Imam; Khudzaifah, Muhammad
Jurnal Riset Mahasiswa Matematika Vol 2, No 3 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i3.16335

Abstract

The issue of message security or an information is very important. A science that studies about securing the confidentiality of messages using passwords is called cryptography. To enhance security, two algorithms are combined to secure messages. Super encryption is a concept that uses a combination of two or more substitution and permutation (transposition) cryptography techniques to obtain an algorithm that is more difficult to crack. The first thing to do is to encrypt the message using a substitution technique (Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In this study, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipher and Bifid Cipher algorithms to secure messages. The message encryption process is using the Vigenere Cipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for the second encryption process. The encryption process is done the other way around, starting from the back of the encryption process. The combination of these two algorithms results in more secure message security.
Penggabungan Algoritma Hill Cipher dan ElGamal untuk Mengamankan Pesan teks Fadlilah, Siti Nur; Turmudi, Turmudi; Khudzaifah, Muhammad
Jurnal Riset Mahasiswa Matematika Vol 1, No 5 (2022): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v1i5.14496

Abstract

Hill Cipher is a one of the symmetric key cryptography algorithm that using an invertible matrix with an order n×n as a key to encrypt and decrypt plaintext. Meanwhile, ElGamal is other asymmetric key cryptography algorithm that use the complexity of discrete logarithms in the encryption and decryption process. In this study, the authors are interest in combine the Hill Cipher and ElGamal algorithms to secure text messages. The author use the matrix as a symmetric key and converts the plaintext in the table of ASCII 256. Then encrypt using the Hill Cipher algorithm which results the ciphertext from messages and ElGamal algorithm results the ciphertext of the symmetric key. In processing decryption using the ElGamal algorithm to determine the symmetric key that will be used as a key in the decryption process with the Hill Cipher algorithm so that the original plaintext is obtained. Then the results obtained are that the combination of the Hill Cipher and ElGamal algorithms to secure text messages can be done it well.
Modifikasi Vigenere Cipher Menggunakan Grup Simetri untuk Mengamankan Pesan Teks Cahyanti, Niken Dwi; Turmudi, Turmudi; Khudzaifah, Muhammad
Jurnal Riset Mahasiswa Matematika Vol 2, No 5 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i5.16791

Abstract

Cryptography is widely used to overcome information security problems that are exchanged on the internet network. One of the algorithms in cryptography is the Vigenere Cipher, the algorithm is known as a robust method and is not easily solved. However, the Vigenere Cipher algorithm has a weakness, namely the key is short and is used repeatedly. Therefore, it is necessary to modify the Vigenere Cipher. The purpose of this study is to determine the modification of the Vigenere Cipher using a symmetric group and also to determine the level of security of the encryption results of Vigenere Cipher modification when compared to the Vigenere Cipher. The results obtained from this research is a new algorithm of the modification process of the Vigenere Cipher using symmetric groups. The modified Vigenere Cipher algorithm is proven to be stronger than the Vigenere Cipher. This is because the plaintext is scrambled first using a symmetric group encoding, so that the actual plaintext is safe against attacks by the Kasiski method and exhaustive key search. In addition, the resulting new algorithm also supports the use of capital letters, lowercase letters, numbers, and symbols.
Pengamanan Pesan Teks Menggunakan Affine Cipher dan Algoritma Goldbach Code Rafika Zahrotul Fauziah; Khudzaifah, Muhammad; Herawati, Erna
Cyber Security dan Forensik Digital Vol. 7 No. 1 (2024): Edisi Bulan Mei Tahun 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.1.4406

Abstract

Perkembangan informasi saat ini memiliki dampak negatif juga positif. Untuk menanggulangi adanya dampak negatif, diperlukan adanya kriptografi. Hal ini bertujuan agar keamanan pesan teks terjaga. Affine Cipher merupakan salah satu algoritma kriptografi simetris yang menggunakan (m) sebagai kunci multiplikatif dan (b) sebagai jumlah pergeseran pada saat proses enkripsi. Pada saat proses dekripsi menggunakan balikan dari kunci multiplikatif (m-1). Goldbach Code diasumsikan bahwa setiap bilangan bulat genap yang lebih besar dari empat merupakan penjumlahan dari dua bilangan prima. Penelitian ini memiliki dua tahapan, yaitu: proses enkripsi dan dekripsi. Pada penelitian ini, proses yang akan dilakukan bertujuan untuk mengamankan pesan teks yang diawali dengan mengenkripsikannya menggunakan Affine Cipher dan setelahnya akan dikompresi dengan menggunakan Algoritma Goldbach Code untuk menghasilkan cipherteks. Kemudian untuk mengembalikan pesan akan didekompresi dengan menggunakan Algoritma Goldbach Code dan dekripsi dengan menggunakan Affine Cipher. Dengan menggabungkan Affine Cipher dan Algoritma Goldbach code hasil dari proses pengamanan pesan teks akan lebih aman dikarenakan cipherteks yang dihasilkan memiliki panjang bit yang berbeda. Kata kunci: Affine Cipher; Goldbach Code; Algoritma Kompresi; Kriptografi -------------------------------------------------------------------------  The development of information today has both negative and positive impacts. To overcome the negative impact, cryptography is needed. This aims to maintain the security of text messages. Affine Cipher is a symmetric cryptography algorithm that uses (m) as the multiplicative key and (b) as the number of shifts during the encryption process. The decryption process uses the reciprocal of the multiplicative key (m-1). Goldbach Code assumes that every even integer greater than four is the sum of two prime numbers. This research has two stages, namely: encryption and decryption process. In this research, the process that will be carried out aims to secure text messages that begin by encrypting them using Affine Cipher and afterwards will be compressed using the Goldbach Code Algorithm to produce ciphertext. Then to restore the message, it will be decompressed using the Goldbach Code Algorithm and decrypted using Affine Cipher. By combining Affine Cipher and Goldbach Code Algorithm, the result of the text message security process will be more secure because the resulting ciphertext has a different bit length. Keywords: Affine Cipher; Goldbach Code; Compression Algorithm; Cryptography
Studi Komparatif Algoritma RSA dan AES pada Enkripsi dan Dekripsi Citra Digital Muhamad Sabilal Karim, Rifqi; Khudzaifah, Muhammad; Rozi, Fachrur
Jurnal Riset Mahasiswa Matematika Vol 4, No 2 (2024): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v4i2.31191

Abstract

In the digital era, data protection has become a priority, especially for digital images that hold significant value in the fields of communication, security, and medicine. This study compares the performance of the RSA and AES algorithms in encrypting and decrypting digital images, using three main parameters: processing time, file size change, and image quality measured by Mean Squared Error (MSE). This study was conducted experimentally in a quantitative manner on 50 digital images of small and medium resolution. RSA uses public and private keys, while AES utilizes the SubBytes, ShiftRows, MixColumns, and AddRoundKey processes. The results show that AES is faster in encryption and decryption compared to RSA. However, the quality of the image resulting from RSA encryption is lower, as evidenced by the higher MSE value. In terms of file size, RSA tends to produce smaller files, while AES results in larger sizes. This research provides guidance for selecting encryption algorithms that meet the needs of specific applications, particularly in visual data security. These findings are expected to assist students and information security practitioners in determining the optimal algorithm to protect digital images from threats.
PELATIHAN PEMBUATAN BAHAN AJAR BERBASIS MULTIMEDIA BAGI GURU-GURU AL YASINI PASURUAN Khudzaifah, Muhammad; Sa'adati, Hawzah
JRCE (Journal of Research on Community Engagement) Vol 1, No 2 (2020): Journal of Research on Community Engagement
Publisher : Universitas Islam Negeri Maulana Malik Ibrahim Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrce.v1i1.7639

Abstract

Multimedia provides opportunities for educators to develop learning techniques so as to produce maximum results, with multi media it is hoped that they will be easier to determine with what and how students can absorb information quickly and efficiently. Until now, interactive learning media has not been developed optimally in Indonesia. One obstacle in the development of interactive learning media is the lack of mastery of interactive media development technology by teachers, so the development of interactive learning materials with computers is less than optimal. This online-based learning media development training that will be developed and applied for teachers at the Al Yasini Pasuruan Foundation is expected to provide new insights in making instructional media, given the ability of this program in terms of making animations for attractive online-based learning media in a relatively easy way . With the mastery of online-based learning media by the teachers at the Al Yasini Pasuruan Foundation, it is hoped that it will trigger students' interest to be more enthusiastic in following the lessons, and ultimately will improve the overall quality of learning.
KEGIATAN PELATIHAN PEMBUATAN BAHAN AJAR BERBASIS ONLINE BAGI GURU-GURU SD MA’ARIF KETEGAN Khudzaifah, Muhammad; Fannani, Bakhruddin
JRCE (Journal of Research on Community Engagement) Vol 4, No 1 (2022): Journal of Research on Community Engagement
Publisher : Universitas Islam Negeri Maulana Malik Ibrahim Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrce.v4i1.17387

Abstract

During the Covid-19 emergency, schools have implemented learning activities in the midst of an emergency according to the conditions and creativity of each school, where students learn from home with guidance from teachers and parents. In this activity, it is directed to achieve the objectives of this training, the instructors get additional knowledge of knowledge about making interactive online-based multimedia learning media and can create interactive online-based multimedia learning media. The methods applied in this activity are direct training and practice. In this training, several activities will be given including the presentation of material and the practice of making media by the training participants. Furthermore, the learning media that has been done by the teachers are presented in front of the class to provide input to each other for the improvement of the learning media that has been made. The result of this activity is a YouTube channel containing instructional videos made by SD Ma'arif Ketegan teachers.
Pendampingan Anggota Igra dalam Melaksanakan Proses Belajar Mengajar Kreatif dan Menyenangkan Berbasis Konten Kreator Karisma, Ria Dhea Layla Nur; Sa'adati, Hawzah; Khudzaifah, Muhammad; Ismiarti, Dewi; Alisah, Evawati; Aghniacakti, Ainindita
JRCE (Journal of Research on Community Engagement) Vol 6, No 1 (2024): Journal of Research on Community Engagement
Publisher : Universitas Islam Negeri Maulana Malik Ibrahim Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrce.v6i1.29118

Abstract

Education is an effective way to combat poverty, with teachers playing key roles as facilitators, motivators, and guides in the learning process. In early childhood education, particularly in Raudhatul Athfal (RA), teachers play a crucial role in instilling values of faith, independence, and good moral character in children during their golden age (0-5 years old). This research aims to empower RA teachers in Kecamatan Turen to create social media-based learning content as an innovative method to enhance student engagement.The research method employed is Participatory Action Research (PAR), involving 13 RA institutions in Kecamatan Turen, with a focus on training teachers to produce digital learning content. The findings reveal that most teachers already use digital tools in teaching, but there are still challenges in developing digital content that aligns with the cognitive development of young children. Additionally, the study emphasizes the importance of creating official social media accounts and websites for each RA, integrated into a unified platform at the district level.The outcomes of this program are expected to enhance teachers' abilities in utilizing social media as an interactive and engaging learning tool. Thus, empowering teachers to create educational digital content is key to improving the quality of education, especially for early childhood. Continuous evaluation through feedback allows for the refinement of teaching methods, fostering a more effective and creative learning environment.