Claim Missing Document
Check
Articles

Found 13 Documents
Search

IMPLEMENTASI ALGORITMA KRIPTOGRAFI BLOWFISH UNTUK PENGAMANAN FILE BERBASIS DESKTOP Winda; Surimi, La; Julian Efendi, Ilham
AnoaTIK: Jurnal Teknologi Informasi dan Komputer Vol 3 No 1 (2025): Juni 2025
Publisher : Program Studi Ilmu Komputer FMIPA-UHO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33772/anoatik.v3i1.108

Abstract

This research aims to implement the Blowfish cryptographic algorithm in a desktop-based file security application, to enhance user data confidentiality and security. Blowfish, as a symmetric block cipher, was chosen for its effectiveness in encrypting 64-bit data through 16 rounds of the Feistel function. The encryption process involves the use of P-array and S-box tables, as well as XOR and modulo 2^32 addition operations. The developed application supports various file formats, including PDF, TXT, JPG, PNG, MP3, and MP4, with a maximum size limit of 50 MB. The research methodology uses Rapid Application Development (RAD) to accelerate the development cycle, with stages including user requirements planning, design, iterative development, and testing. White box testing is applied to verify the implementation of the Blowfish algorithm and application functionality. Avalanche effect analysis is performed to evaluate the algorithm's sensitivity to small changes in input, ensuring robust data security. The test results show that the Blowfish algorithm was successfully implemented, with each application function running as expected. The avalanche effect proves that small changes in input produce significant changes in the encryption output, indicating a high level of security. This application is designed to operate offline and has a user-friendly interface, making it accessible to users with various levels of technical expertise.
Ensuring transcript integrity with SHA-3 and digital signature standard: a practical approach Nur Alam, Wa Ode Siti; Sajiah, Adha Mashur; Bahtiar Aksara, La Ode Muhammad; Surimi, La; Ransi, Natalis; Nangi, Jumadil
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1957-1969

Abstract

Academic transcripts are essential documents in higher education, reflecting students’ academic performance and capabilities. However, the current management of transcript data at Halu Oleo University (UHO) lacks safeguards against unauthorized alterations, compromising their authenticity. This study proposes a method using the secure hash algorithm 3 (SHA-3) and the digital signature standard (DSS) scheme to ensure the integrity of transcript data. A Python-based web module for managing transcripts and a signing program using SHA-3 and DSS were developed and implemented. This method digitally signs transcript files, ensuring that subsequent changes invalidate the current digital signature. Efficiency tests demonstrated an average signing time of 0.242 seconds, indicating a practical and efficient solution. The study’s findings emphasize how SHA-3 and DSS effectively authenticate academic transcript files, preventing unauthorized modifications and safeguarding the integrity of critical educational records. This method presents a robust and efficient solution for educational institutions to strengthen the security and reliability of their academic record management systems.
CART and Random Forest Analysis on Graduation Status of Halu Oleo University Students Rahman, Gusti Arviana; Notodiputro, Khairil Anwar; Sartono, Bagus; Surimi, La
Inferensi Vol 8, No 3 (2025)
Publisher : Department of Statistics ITS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j27213862.v8i3.23336

Abstract

Classification and Regression Tree (CART) is a popular classification method and it is used in various fields. The method is capable to be applied on various data conditions. An alternative method of CART is random forest. These two methods of classification were studied in this paper using graduation data of Halu Oleo University. This data was interesting due to the imbalance problem existed in the data. We compared several scenarios, namely the CART and Random Forest methods, Random Forest with oversampling, and Random Forest with undersampling. There were three explanatory variables considered in the model including Study Program, GPA, and TOEFL score. The results showed that the best method to classify the student’s graduation status at Halu Oleo University is Random Forest without handling imbalanced data, as it provided the highest sensitivity. This suggests that Random Forest, even without specific adjustments for data imbalance, can effectively capture the patterns in the data and provide accurate classifications, making it a robust choice for this dataset.