Rizky Rinaldi
Universitas Pembangunan Pancabudi

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Implementasi Metode LCG Pada Aplikasi CBT Untuk Tes Potensi Akademik Berbasis Web Rizky Rinaldi
Journal of Applied Computer Science and Technology Vol 3 No 2 (2022): Desember 2022
Publisher : Indonesian Society of Applied Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52158/jacost.v3i2.424

Abstract

In the Academic Potential Test of new students at the Raudhatul Akmal Islamic College (STAIRA) Batang Kuis, do not yet have a Computer Based Test (CBT) or a computer-based exam for the freshman academic potential test exam. So that the exam is still carried out manually and costs a lot of money in its implementation. But it also makes the exam process less carried out because some students can cheat when filling in answers by cheating friends. Therefore, in this study aims to create a web-based Computer Based Test (CBT) application and randomize the questions in it by applying the Linear Congruent Generator (LCG) method. The result of this study is a web-based application for academic potential test exams that are expected to overcome the problems that exist in the current STAIRA Batang Kuis. The order of the questions will be automatically randomized when students conduct an academic potential test exam based on their respective student identification numbers.
Analisis Keamanan Modifikasi Metode Caesar Chiper Dalam Teknik Enkripsi Dan Deskripsi Rizky Rinaldi
Journal of Digital Ecosystem for Natural Sustainability Vol 2 No 2 (2022): Desember 2022
Publisher : Fakultas Komputer - Universitas Universal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63643/jodens.v2i2.99

Abstract

The confidentiality and integrity of a message that will be conveyed is one aspect that every individual expects in carrying out information exchange activities. Many techniques that can be used to secure data include cryptography. Cryptography aims to provide security services (which are also referred to as security aspects). To be able to use cryptographic techniques, a method is needed, one of which is the Caesar Cipher method. Changes made to the character set in the caesar chiper algorithm have succeeded in making this algorithm have a better level of security. The result of the analysis of this study is that the chipertext pattern that is incited is more varied so that the level of security of this method is better than before.