Claim Missing Document
Check
Articles

Found 2 Documents
Search

Enhancing Text Messages with a Combination of Vigenère Cipher and One Time Pad Using Random Key LFSR Ibezato Zalukhu, Anzas; Sitorus, Zulham; Suhardiansyah, Suhardiansyah; Septiani, Nadya
Jurnal Sains dan Teknologi Vol. 6 No. 1 (2024): Jurnal Sains dan Teknologi
Publisher : CV. Utility Project Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/saintek.v6i1.3190

Abstract

In today's global era, the development of information systems is rapidly advancing and becoming increasingly sophisticated, with nearly all elements utilizing information and communication technology in their daily activities. One frequent activity is the transmission or exchange of data over the internet. However, this advancement also raises concerns about the security of messages or data being sent. To mitigate the risk of message misuse, cryptographic techniques can be used to maintain data or message confidentiality by encrypting the information before transmission. This research aims to combine the Vigenère cipher algorithm with a one-time pad using a random key generated by a linear feedback shift register (LFSR) method to enhance the security of text messages. The research methodology involves generating a public key for the One-Time Pad algorithm using LFSR. The encryption process is initially performed with the Vigenère cipher, and the resulting encrypted message is further encrypted using the one-time pad with a key generated by the LFSR method. This algorithm is implemented using the Visual Basic programming language. The research findings indicate that the combination of the two algorithms, with the random key generated by the LFSR for the One-Time Pad, is capable of enhancing text message security by producing random and unique ciphertexts. By using Modulo 256 and ASCII conversion, random ciphertexts can be generated, thereby reducing the likelihood of message breaches. Additionally, this research provides further insights into the process of text message encryption and decryption.
Optimization of Kaayana Store Inventory through Transaction Pattern Analysis Using the Apriori Algorithm Suhardiansyah, Suhardiansyah; Muhammad Iqbal
Journal Of Data Science Vol. 3 No. 01 (2025): Journal Of Data Science, March 2025
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/jds.v3i01.6398

Abstract

This study aims to optimize inventory management at Kaayana Store by analyzing sales transaction patterns using the Apriori algorithm. The transaction data collected shows that products with the codes ACC (accessories) and BJU (clothing) dominate purchases, accounting for 71.4% of total transactions. The analysis results identify a strong relationship between these products, which are frequently purchased together by consumers. Based on these findings, Kaayana Store needs to ensure the availability of ACC and BJU stocks to meet high demand, avoid stockouts, and improve operational efficiency. Proposed inventory management strategies, such as more precise product placement and bundling promotions, are expected to enhance customer satisfaction and support the sustainability of Kaayana Store's business