Claim Missing Document
Check
Articles

Found 31 Documents
Search

APLIKASI KRIPTOGRAFI KOMPOSISI ONE TIME PAD CIPHER DAN AFFINE CIPHER Firdaus, Ivan Luckiyana; Marwati, Rini; Sispiyati, Ririn
Jurnal EurekaMatika Vol 5, No 2 (2017): Jurnal EurekaMatika
Publisher : Mathematics Program Study, Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (489.114 KB) | DOI: 10.17509/jem.v5i2.9597

Abstract

ABSTRAK. Kriptografi one time pad cipher memiliki kelemahan padakurangnya keefisienan dalam pembentukan dan pengiriman kuncinya jikamenggunakan cara manual untuk menentukan kuncinya. Salah satu caraagar pembentukkan kuncinya lebih mudah dengan menggunakan aturanbarisan Fibonacci terhadap teks asli(plaintext) sehingga menghasilkankunci untuk one time pad cipher. Untuk lebih mempersulit pemecahan, onetime pad cipher dikomposisikan dengan affine cipher yang merupakandasar dari algoritma kriptografi klasik yang menggunakan metodesubtitusi. Skripsi ini membahas bagaimana pengkonstruksian kunci untukone time pad cipher dan pembuatan program aplikasi komposisi one timepad cipher dan affine cipher. Hasil dalam penulisan skripsi ini berupaprogram aplikasi untuk mempermudah enkripsi dan dekripsi komposisi onetime pad cipher dan affine cipher yang dibuat menggunakan bahasapemrograman Delphi 7.0.Kata kunci: program aplikasi, one time pad cipher, affine cipher.ABSTRACT. One time pad cipher has a weakness on generating it’s key.There are many ways to cover it’s weakness,such as using Fibonacci seriesformula on the plaintext to generate one time pad cipher’s key. One timepad cipher is an encryption technique that difficult to be cracked. One wayfor a cipher to become more difficult to resolve is by composing twoencryption technique. One time pad cipher which is difficult to be crackedwill be composed by affine cipher which is the base of classic cryptographywhose using substitution methode. This paper aimed to discuss how togenerate one time pad cipher’s key with Fibonacci series formula and howto make application program crptography composition of one time padcipher and affine cipher. And the result of this paper is a programapplication cryptography composition of one time pad cipher and affinecipher using Borland Delphi 7.0, which made encrypting and decryptingbecame easier.Keywords: application program, one time pad cipher, affine cipher.
AN INVESTIGATION OF STUDENTS’ ALGEBRAIC PROFICIENCY FROM A STRUCTURE SENSE PERSPECTIVE Al Jupri; Ririn Sispiyati; Kin Eng Chin
Journal on Mathematics Education Vol 12, No 1 (2021)
Publisher : Department of Doctoral Program on Mathematics Education, Sriwijaya University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22342/jme.12.1.13125.147-158

Abstract

Structure sense can be interpreted as an intuitive ability towards symbolic expressions, including skills to perceive, to interpret, and to manipulate symbols in different roles. This ability shows student algebraic proficiency in dealing with various symbolic expressions and is considered important to be mastered by secondary school students for advanced study or professional work. This study, therefore, aims to investigate students’ algebraic proficiency in terms of structure sense. To reach this aim, we set up a qualitative case study with the following three steps. First, after conducting a literature study, we designed structure sense tasks according to structure sense characteristics for the topic of equations. Second, we administered an individual written test involving 28 grade XI students (16-17 year-old). Third, we analyzed students’ written work using a structure sense perspective. The results showed that about two-thirds of the participated students lack of structure sense in which they tend to use more procedural strategies than structure sense strategies in solving equations. We conclude that the perspective of structure sense provides a fruitful lens for assessing students’ algebraic proficiency.
Peran Representasi Matematis dalam Pembelajaran Perkalian Bentuk Aljabar melalui Pendekatan Matematika Realistik Al Jupri; Dian Usdiyana; Ririn Sispiyati
Jurnal Elemen Vol 6, No 1 (2020): January
Publisher : Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/jel.v6i1.1716

Abstract

Algebra is an abstract topic in mathematics that should initially be learned by students in junior high school level. In order that this topic is easier to understand by students meaningfully, relevant mathematical representations should be used in the learning process. This research aims to analyze the role of mathematical representations in the learning of multiplication of algebraic expressions through the use of realistic mathematics education approach. To do so, we used a qualitative research method, in the form of the learning and teaching process involving 23 grade VII students (12-13-year-old) from one of the schools in Bandung. We analyzed video data of the learning process and the student written work from a formative test. The results showed that visual representations are frequently used by students at the beginning of the learning process and symbolic representations are used after the students get used to using visual representations. The result of the formative test indicated that the use of mathematical representations meaningfully could help students in solving multiplication of algebraic expressions problems. We conclude that the use of mathematical representations—in particular of visual representations using geometry context in algebra learning—helps students to understand the topic of multiplication of algebraic expressions.
The development of mathematics teacher professional competencies through social media Al Jupri; Rini Marwati; Ririn Sispiyati; Rizky Rosjanuardi
Jurnal Elemen Vol 8, No 1 (2022): January
Publisher : Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/jel.v8i1.4782

Abstract

One of the competencies for mathematics teachers that needs to be developed continuously is professional competence. However, even if efforts for developing teachers’ competencies have been made formally by the government, it seems still lacking. This study, therefore, aims to develop mathematics teacher professional competencies through an informal development model using social media. This research used a qualitative method, a case study design, involving 19 mathematics teachers from various regions in Indonesia in the informal development process in the range of 2019-2021. The informal approach was carried out using question-and-answer techniques and guided discussions on mathematical problems. From the teacher development processes, 30 mathematics problems and their solutions were collected. As an illustration of this development process, this article presents five problems and their solutions, including solutions for two mathematics problems on conceptual understanding and three mathematics problems on problem-solving. We conclude that this informal approach is fruitful in helping mathematics teachers solve mathematics problems. This study implies that the teacher development process carried out in this study can be used as a model for informal teacher development by other higher education academics in their respective places.
Teaching and learning process for mathematization activities: The case of solving maximum and minimum problems Al Jupri; Dian Usdiyana; Ririn Sispiyati
JRAMathEdu (Journal of Research and Advances in Mathematics Education) Volume 6 Issue 2 April 2021
Publisher : Department of Mathematics Education, Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/jramathedu.v6i2.13263

Abstract

One of the topics within the course of Essential Concepts in School Mathematics (ECSM) for prospective mathematics teachers concerns maximum and minimum problems. This type of problems requires mathematization, i.e., the activity of transforming a problem into a symbolic mathematics problem and of reorganizing within the mathematical system, in the solution process. This research aims to investigate the implementation of the learning and teaching process of the ECSM course that strengthen prospective mathematics teachers’  conceptual understanding and problem solving abilities through mathematization activities. To reach this aim, this qualitative study was conducted through an observation of the learning and teaching process, including the formative written assessment, for the case of maximum and minimum problems, involving 19 students of mathematics education program. The results of this study revealed that the learning and teaching process is implemented by emphasizing the use of a deductive approach. The written assessment showed students’ strategies and difficulties in dealing with maximum and minimum problems. Main difficulties included constructing visual representations and mathematical models in the mathematization processes. It can be concluded that the learning and teaching processes of the ECSM course need to be improved so as to develop better conceptual understanding and problem solving abilities through mathematization activities.
Convergence Numerically of Trinomial Model in European Option Pricing Entit Puspita, Fitriani Agustina, Ririn Sispiyati
INTERNATIONAL RESEARCH JOURNAL OF BUSINESS STUDIES Vol 6, No 3 (2013): December 2013 - March 2014
Publisher : Universitas Prasetiya Mulya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21632/irjbs.6.3.103

Abstract

Kriptografi Audio Menggunakan Transposisi dan Affine Cipher yang Dikembangkan dengan Algoritma Blum Blum Shub Muhammad Fakhri Naufal; Rini Marwati; Ririn Sispiyati
Jurnal EurekaMatika Vol 9, No 1 (2021): Jurnal Eurekamatika
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (646.764 KB) | DOI: 10.17509/jem.v9i1.32634

Abstract

Di era informasi, teknologi berkembang dengan pesat dan kemudahan dalam bertukar informasi menjadi sangat mudah, namun dengan perkembangan tersebut timbul suatu masalah yaitu keamanan informasi tersebut terutama untuk suatu informasi rahasia. Salah satu bentuk informasi seperti file audio memerlukan sebuah mekanisme untuk mengamankan file audio tersebut, salah satunya dengan kriptografi. Teknik kriptografi audio seperti transposisi membuat data audio teracak sehingga suara yang dihasilkan file audio tersebut tidak dapat dipahami. Namun, untuk meningkatkan keamanan nilai data audio pada file audio diperlukan teknik enkripsi substitusi salah satunya yaitu Affine Cipher. Dengan melakukan pengembangan pada Affine Cipher menggunakan pembangkit bilangan acak semu Blum Blum Shub, dapat memberikan peningkatan yang cukup signifikan pada teknik kriptografi klasik ini. Hasil yang diperoleh dengan mengenkripsi file audio WAV menggunakan Python dapat mengamankan file audio sehingga menghasilkan suara acak dan file audio terenkripsi dapat didekripsi untuk mendapatkan informasi asli.
Model Matematika Resistensi Bakteri Staphylococcus Aerus terhadap Antibiotik Ciprofloxacin serta Respon Sistem Imun Cangra Nalika Khadijah; Siti Fatimah; Ririn Sispiyati
Jurnal EurekaMatika Vol 10, No 1 (2022): Jurnal Eurekamatika
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (359.394 KB) | DOI: 10.17509/jem.v9i2.40056

Abstract

The emergence of antibiotic-resistant bacteria is one of the most serious public health problems. These bacteria develop a defense mechanism against antibiotics, often called immune. In this study, the authors propose a mathematical model that describes the dynamics of sensitive staphylococcus aerus bacteria infected by ciprofloxacin antibiotics, resistant staphylococcus aerus bacteria, and immune cells assuming that the resistance is obtained from the mutations of sensitive bacteria exposed to antibiotic exposure. Qualitative analysis found a balance of the number of bacteria produced by sensitive bacteria that survive the effects of antibiotics and immune cells is less than the number of bacteria produced by resistant bacteria where resistant bacteria would coexist with immune cells in a person's body. The results of this analysis show the fact that when a person's immune system weakens, there is a higher chance of being infected. So, the parameter that can be controlled to suppress the population of resistant bacteria is the effectiveness level of immune cell response to bacteria, this result is supported by numerical simulations performed on the model.Keywords: Antibiotic, Bacterial Resistance, Equilibrium Points, Immune System, Ordinary Differential Equations Systems, Stability.AbstrakMunculnya bakteri yang resisten atau kebal terhadap antibiotik menjadi salah satu masalah kesehatan masyarakat paling serius. Dalam penelitian ini, dikaji model matematika yang menggambarkan dinamika bakteri Staphylococcus aerus sensitif yang terpapar antibiotik ciprofloxacin, bakteri Staphylococcus aerus resisten, dan sel imun dengan anggapan bahwa resistensi diperoleh dari mutasi bakteri sensitif terkena paparan antibiotik. Analisis kualitatif menemukan adanya keseimbangan saat jumlah bakteri yang diproduksi oleh bakteri sensitif yang bertahan terhadap efek antibiotik dan sel imun kurang dari produksi bakteri resisten di mana bakteri resisten akan hidup beriringan dengan sel imun di dalam tubuh seseorang. Hasil dari analisis ini menunjukan fakta bahwa ketika sistem imun tubuh seseorang melemah, maka peluang terinfeksi lebih tinggi. Jadi, parameter yang dapat dikontrol untuk menekan populasi bakteri resisten adalah tingkat efektivitas respon sel imun terhadap bakteri, didukung oleh simulasi numerik yang dilakukan pada model.
E-Cordial Labeling for Cupola Graph Cu(3, b, n) Kartika Yulianti; Fitri Rokhmatillah; Ririn Sispiyati
InPrime: Indonesian Journal of Pure and Applied Mathematics Vol 4, No 1 (2022)
Publisher : Department of Mathematics, Faculty of Sciences and Technology, UIN Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/inprime.v4i1.24210

Abstract

Graph labeling is a map that maps graph elements such as vertices, edges, vertices, and edges to a set of numbers. A graph labeling is named e-cordial if there is a binary mapping f:E(G)→{0,1} which induces the vertex labeling defined by g(v)=Ʃ_{uvϵE(G)}f(uv)(mod 2), so that it satisfies the absolute value of the difference between the number of vertices labeled 1 and the number of vertices labeled 0 is less than equal to 1, and also for the number of edges labeled 0 and labeled 1. A graph that admits the e-cordial labeling is called an e-cordial graph. In this paper, we proved that some of the cupola graph Cu(3,b,n) is e-cordial.Keywords: E-Cordial Labeling; E-Cordial Graph; Cupola Graph Cu(a, b, n). AbstrakPelabelan graf merupakan pemetaan yang memetakan unsur-unsur graf seperti simpul, sisi, simpul dan sisi ke himpunan bilangan. Sebuah pelabelan dinamakan pelabelan e-cordial jika terdapat pemetaan biner f:E(G)→{0,1} yang menginduksi pelabelan simpul yang didefinisikan g(v)=Ʃ_{uvϵE(G)}f(uv)(mod 2) sehingga nilai mutlak dari selisih banyaknya simpul yang dilabeli 1 dan banyaknya simpul yang dilabeli 0 kurang dari sama dengan 1, dan nilai mutlak dari selisih banyaknya sisi yang dilabeli 1 dan banyaknya sisi yang dilabeli 0 kurang dari sama dengan 1. Sebuah graf yang dapat dilabeli secara e-cordial dinamakan graf e-cordial. Pada makalah ini dibuktikan bahwa beberapa graf kubah Cu(3,b,n) adalah e-cordial.Kata Kunci : Pelabelan E-Cordial; Graf E-Cordial; Graf Kubah Cu(a, b, n).
Kriptografi Visual pada Gambar Berwarna (RGB) Menggunakan Algoritma Elliptic Curve Cryptography Della Annisa Zahra; Rini Marwati; Ririn Sispiyati
Jurnal EurekaMatika Vol 9, No 2 (2021): Jurnal EurekaMatika
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (258.152 KB) | DOI: 10.17509/jem.v9i2.40054

Abstract

Cryptography held an important role in the digital era for securing data from hackers. As technology develops, types of data that can be secured using cryptography is expanding, one of which is securing images using visual cryptography. Visual cryptography is a cryptosystem that splits an image into parts and can only be solved if it has all parts of the image. Another type of cryptography that can be used to secure data is Elliptic Curve Cryptography (ECC). ECC uses a field of prime numbers consists of points on the elliptic curve as a technique to secure data. In this research, a cryptosystem development was carried out by visual cryptography combined with ECC and its implementation in constructing a computer application program using MATLAB R2014a. Results show that the development of visual cryptography using Elliptic Curve Cryptography can complicate cryptanalysis because it has two algorithms and cannot be hacked if only one share image was obtained. Keywords: Cryptography, Elliptic Curve Cryptography, Visual Cryptography.AbstrakKriptografi berperan penting pada era digital dalam mengamankan data dari peretas. Seiring berkembangnya teknologi, data yang dapat diamankan menggunakan kriptografi semakin luas, salah satunya adalah mengamankan gambar menggunakan kriptografi visual. Kriptografi visual merupakan kriptosistem yang memecah suatu gambar menjadi beberapa bagian dan hanya dapat dipecahkan jika memiliki semua bagian dari gambar tersebut. Jenis kriptografi lain yang dapat digunakan dalam mengamankan data adalah elliptic curve cryptography (ECC). ECC menggunakan suatu lapangan atas bilangan prima yang berisi titik-titik pada kurva eliptik sebagai teknik pengamanan datanya. Dalam penelitian ini dilakukan pengembangan kriptosistem dengan menggabungkan kriptografi visual dan ECC serta implementasinya dalam mengkonstruksi program aplikasi komputer menggunakan MATLAB R2014a. Pengembangan kriptografi visual menggunakan Elliptic Curve Cryptography dapat mempersulit kriptanalisis karena harus meretas dua algoritma dan tidak akan bisa diretas jika hanya memperoleh salah satu share image.