Mohammad Andri Budiman
Universitas Sumatera Utara

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

On Factoring The RSA Modulus Using Tabu Search Ade Candra; Mohammad Andri Budiman; Dian Rachmawati
Data Science: Journal of Computing and Applied Informatics Vol. 1 No. 1 (2017): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (468.763 KB) | DOI: 10.32734/jocai.v1.i1-65

Abstract

It is intuitively clear that the security of RSA cryptosystem depends on the hardness of factoring a very large integer into its two prime factors. Numerous studies about integer factorization in the field of number theory have been carried out, and as a result, lots of exact factorization algorithms, such as Fermat’s factorization algorithm, quadratic sieve method, and Pollard’s rho algorithm have been found. The factorization problem is in the class of NP (non-deterministic polynomial time). Tabu search is a metaheuristic in the field of artificial intelligence which is often used to solve NP and NP-hard problems; the result of this method is expected to be close-to-optimal (suboptimal). This study aims to factorize the RSA modulus into its two prime factors using tabu search by conducting experiments in Python programming language and to compare its time performance with an exact factorization algorithm, i.e. Pollard’s algorithm. The primality test is done with Lehmann’s algorithm.
Implementation and comparison of Berry-Ravindran and Zhu- Takaoka exact string matching algorithms in Indonesian-Batak Toba dictionary Efelin Siburian; Mohammad Andri Budiman; Jos Timanta
Data Science: Journal of Computing and Applied Informatics Vol. 1 No. 1 (2017): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (302.032 KB) | DOI: 10.32734/jocai.v1.i1-67

Abstract

Indonesia has a variety of local languages, which is the Batak Toba language. This time, there are still some Batak Toba people who do not know speak Batak Toba language fluently. Nowadays, desktop based dictionary is one of reference that very efficiently used to learn a language and also to increase vocabulary. In making the dictionary application, string matching can be implemented for word-searching process. String matching have some algorithm, which is Berry – Ravindran algorithm and Zhu-Takaoka algorithm and will be implemented on the dictionary application. Zhu-Takaoka algorithm and Berry – Ravindran algorithm have two phases, which are the preprocessing phase and the searching phase. Preprocessing phase is a process to make the shifting values according to in pattern that input by user. To know the shifting value with Zhu-Takaoka algorithm, it’s need Zhu-Takaoka Bad Character (Ztbc) and Boyer-Moore Good Suffix (Bmgs). Then, Ztbc will be compared to Bmgs to get the maximum value of them that will be set as shifting value. While Berry-Ravindran algorithm, to know the shifting value is needed Berry-Ravindran Bad Character, which the two characters right of the text at the position m + 1 and m+ 2, is needed to determine the shifting value, where m is length of the pattern.
Using random search and brute force algorithm in factoring the RSA modulus Mohammad Andri Budiman; Dian Rachmawati
Data Science: Journal of Computing and Applied Informatics Vol. 2 No. 1 (2018): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1163.568 KB) | DOI: 10.32734/jocai.v2.i1-91

Abstract

Abstract. The security of the RSA cryptosystem is directly proportional to the size of its modulus, n. The modulus n is a multiplication of two very large prime numbers, notated as p and q. Since modulus n is public, a cryptanalyst can use factorization algorithms such as Euler’s and Pollard’s algorithms to derive the private keys, p and q. Brute force is an algorithm that searches a solution to a problem by generating all the possible candidate solutions and testing those candidates one by one in order to get the most relevant solution. Random search is a numerical optimization algorithm that starts its search by generating one candidate solution randomly and iteratively compares it with other random candidate solution in order to get the most suitable solution. This work aims to compare the performance of brute force algorithm and random search in factoring the RSA modulus into its two prime factors by experimental means in Python programming language. The primality test is done by Fermat algorithm and the sieve of Eratosthenes.
Computing the Value of Pi in the Manner of Lambda Function with R Statistical Programming Language Muhammad Reza Fahlevi; Mohammad Andri Budiman
Data Science: Journal of Computing and Applied Informatics Vol. 5 No. 1 (2021): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v5.i1-5556

Abstract

The value of π is one of the famous mathematical constant, not only to mathematicians, but also to physicists and to engineers. Numerous algorithm is used to compute what is the value of π, but most of programmer do not use lambda function and neglect the aesthetic of their script. This study aims to compute the value π by write it first as infinite series using Riemann sum, and then the computing of it is conducted in R programming language. We involved the role of anonymous function or known as lambda function to make the R code is more beautiful, artistic, and elegant.
PERBANDINGAN ALGORITMA MESSAGE DIGEST-5 (MD5) DAN GOSUDARSTVENNYI STANDARD (GOST) PADA HASHING FILE DOKUMEN Marthin Benedict; Mohammad Andri Budiman; Dian Rachmawati
JTIK (Jurnal Teknik Informatika Kaputama) Vol 1, No 1 (2017)
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (299.69 KB)

Abstract

Dokumen elektronik memiliki sifat terbuka, artinya isi dokumen dapat dibaca dan diubah dengan mudah olehpihak-pihak yang tidak berhak. Hal tersebut menyebabkan integritas dokumen menjadi tidak terjamin. Integritasdokumen elektronik dapat dijamin dengan menggunakan teknik kriptografi, salah satunya hash function. Adabanyak algoritma yang dapat digunakan untuk hashing file atau dokumen, dua algoritma diantaranya adalahalgoritma Message Digest-5 (MD5) dan algoritma Gosudarstvennyi Standard (GOST). Secara garis besar,kedua algoritma mengambil panjang isi file atau pesan dalam bit lalu dibagi menjadi blok-blok bit setelah itupada setiap blok akan dilakukan operasi matematika sehingga menghasilkan 128 bit nilai hash pada MessageDigest-5 (MD5) dan 256 bit nilai hash pada Gosudarstvennyi Standard (GOST). Setelah itu, nilai hash diubahdalam bentuk heksadesimal sehingga Message Digest-5 (MD5) akan menghasilkan 32 karakter heksadesimalnilai hash dan 64 karakter heksadesimal nilai hash pada Gosudarstvennyi Standard (GOST).