Claim Missing Document
Check
Articles

Analisis Performa Algoritme SPECK Pada Arduino Uno Zuroul Mufarokah; Mochammad Hannats Hanafi Ichsan; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (468.908 KB)

Abstract

SPECK algorithm is an algorithm that still has a family with lightweight block cipher algorithm. This algorithm was published by the National Security Agency (NSA) in June 2013. This algorithm is used to optimize in a software implementation. This algorithm has 10 block variants, namely block size 32 and key size 64 bits, up to block size 128 and key size 256 bits, selection of the three SPECK type variations following previous research that utilizes the AES algorithm to secure data where AES research has three variation based on the length of a key, AES-128, AES-192 and AES-256. In this study it can be concluded that between the results of encryption and decryption are valid with test vectors, SPECK block size 128 bits and key size 128 bits 1047.6 ms, SPECK block size 128 bits and key size 192 bit 1080.8 ms and SPECK block size 128 bits and key size 256 bits 1114.6 ms. Afterwards the results were put in Kruskal-Wallis and Post Hoc tests to be analyzed and concluded with each change While the results at the time of encryption and decryption of the three algorithms also have significant time differences.
Implementasi Digital Signature pada Secure Electronic Prescription menggunakan Digital Signature Algorithm berbasis Android Hanaria Rotua Tampubolon; Ari Kusyanti; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (388.493 KB)

Abstract

Medication safety is a term to describe safety precautions from drug use. Medication safety prevents deaths that were caused by drugs that were prescribed wrongly. One of the main causes of wrongly prescribing a drug is the pharmacist not being able to read a doctor's instruction which is not standardized. Such problems can be overcome by using e-prescription, which can be utilized by doctor's and other medical staff to prescribe and send the prescription. However, there are risks of forgery and denial of the e-prescription. Therefore, a security mechanism needs to be installed on the e-prescription to guarantee integrity, authentication, and non-repudiation, which is in the form of a digital signature. This research will explain the design, implementation, security, and performance of the Android based e-prescription using the Digital Signature Algoritm method and SHA-1 as a hash function. The research results test the integrity aspect using a brute force, collision attack, and birthday attack. However, the integrity aspect could not be fulfilled, because the hash function being used which was SHA-1, was very vulnerable to the previously mentioned attack types. To ensure the authentication and non-repudiation aspect, a test was conducted and both aspects were fulfilled. The process of forming and verifying the signature required 6.36963 ms and 11,79276 ms respectively. The implementation of the digital signature on the e-prescription using DSA in this research was considered a success in the authentication and non-repudiation aspects.
Implementasi Algoritme COZMO untuk Enkripsi dan Dekripsi Data pada QR Payment Suhadak Akbar; Ari Kusyanti; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (504.703 KB)

Abstract

QR payment is a payment method by scanning the QR code from mobile application. QR payment requires a security method so that the transaction data cannot be misused or manipulated by certain parties. Cryptography is one of the techniques that can be used to improve data security. One algorithm that can be used is COZMO algorithm. This algorithm is a stream cipher algorithm formed by a combination of Trivium and A5/1. COZMO algorithm is implemented on two Android applications for customer and cashier using the Java programming language and encrypting the transaction data. Based on the input length during the time performance test, 37 characters took 2.05 seconds, 68 characters required 2.06 seconds, while 169 characters took 2.15 seconds. These results indicated that the number of inputs could affect the processing time. A test was conducted over the input length of 68 characters in order to compare the application's performance time before and after implementing the COZMO algorithm which resulting a time difference of 0.3 seconds on the customer's application and 0.4 seconds on the cashier's application. Statistical calculations of the test results showed significant differences after the COZMO algorithm was applied. On the security test, the ciphertext only attack on ciphertexts could not find any plaintext due to the key used was too long. These results showed that COZMO algorithm could be used to secure transaction data.
Implementasi Algoritme Acorn untuk Pengamanan Data pada Protokol MQTT menggunakan Perangkat Wemos ESP8266 Mabda Amnesti Hananto; Ari Kusyanti; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (534.971 KB)

Abstract

Security attacks are threat that could happen on computer network. One of the attacks could happen on data transmission process. Cryptography could be the solution for securing the process of data transmission process. Acorn algorithm is a cryptography algorithm that guarantees two security aspects which are confidentiality and authentication. Acorn algorithm is implemented on devices that have a limited resource such as Wemos ESP8266 microcontroller. MQTT is a delivery protocol used in this research. The components of MQTT are publisher, subscriber and broker. Publisher sends ciphertext and tag to the broker according to the topic. Subscriber subscribs to the broker according to the topic for receiving ciphertext and tag. Test vector testing, encryption and decryption performance testing, also security testing is conducted to make sure the system is working properly. The average time result on encryption is 312.6 milliseconds, and decryption is 61.2 milliseconds. Security testing is conducted by doing an attack such as ciphertext-only attack and impersonation. The result of the security testing, Acorn algorithm has a security aspect that cannot be attacked or breached.
Implementasi Algoritme AEGIS untuk Payload Data Protokol MQTT dan CoAP pada Raspberry Pi 3 Helmy Rafi Nawawi; Ari Kusyanti; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (650.537 KB)

Abstract

Raspberry Pi 3 is a device that can be used as a middleware. Middleware facilitates communication and information management between heterogeneous components. Based on previous research, there is a security gap in the data transmission system that exposes data packets to an unauthorized party. This problem can be solved with AEGIS algorithm. AEGIS algorithm is a method that guarantees confidentiality and authentication. AEGIS is suitable to be implemented in network communication because it protects packets during transmission. Based on research results, AEGIS algorithm was successfully implemented in MQTT and CoAP protocol's data payload. AEGIS when implemented on the researched system was tested with vector testing and was stated as valid. Time performance test is conducted on middleware systems that either used MQTT or CoAP protocol's, the testing process was time data samples with and without using the AEGIS algorithm. The average results indicated the time difference of a MQTT system that used MQTT system that used AEGIS and without AEGIS was 19.592 milliseconds. Meanwhile, the average of time difference of CoAP system that used AEGIS and without AEGIS was 28.141 milliseconds. The above mentioned results prove that the AEGIS algorithm is capable of securing data confidentiality and authentication on a Raspberry Pi 3.
Implementasi Algoritme Kriptografi SIMON pada Arsitektur Amazon Web Services Sastra Ginata; Ari Kusyanti; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (573.325 KB)

Abstract

Amazon Web Services (AWS) is one of the cloud computing services which has been primarily used by most of the big industries recently. One of the AWS services which has the advantage to store online data is the Amazon Simple Storage Service (Amazon S3). In this particular service features, there is a data security options, specifically Amazon Client Side Encryption, that works by securing the object and using the key that has been stored by the user in the hand of the client which later would be uploaded to the bucket of the Amazon S3. One of the vital state organization in the United States, National Security Agency (NSA), has launched a cryptography algorithm named SIMON. SIMON Algorithm is a block cipher algorithm that could be applied either in the software or hardware depending to the needs of the users themselves. SIMON Algorithm is applied in the website system by using Python, that is used for encrypting the file which later would be uploaded to the chosen bucket. Based on the result of time performance test, the average speed of both encryption and decryption files are 33.7 seconds and 28.5 seconds. And in the variaton file testing, the result showed that the SIMON algorythm is capable of encrypting files with the extention file: .txt, .docx, .pdf, .png, .jpg, .mp3, .m4a, .mp4 dan .mkv.
Implementasi Metode Autentikasi dengan Zero Knowledge Proof menggunakan Protokol Feige-Fiat-Shamir Identification Scheme pada Perangkat Internet of Things Luthfi Maulana; Ari Kusyanti; Fariz Andri Bachtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 9 (2019): September 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (492.364 KB)

Abstract

Authentication is one of many problems about the security of Internet of Things (IoT) devices. Authentication on IoT devices is urgently needed as development on IoT grows. Because IoT devices are constrained devices, a conventional method for authentication is difficult to use. Furthermore, one of the authentication mechanism used in IoT devices called, JSON Web Token (JWT), still has many problems when used on an insecure connection. Zero Knowledge Proof uses the Feige-Fiat-Shamir Identification Scheme protocol which can be used as a solution for problems regarding authentication difficulties on IoT devices. Results from the research show that the system is able to conduct the authentification process using Feige-Fiat-Shamir Identification Scheme protocol with attack resistance limited to keys having an 20 bit length and 20 rounds, a sniffing attack did not result in the compromisation of any confidential data and a brute force attack did not managed to gain the value of modulus n and private key S. Another finding suggests that the amount of rounds has a significant correlation with memory usage of the device and the amount of rounds has an insignificant correlation with the system's execution time.
Implementasi Algoritme Grain-128 pada Wireless Sensor Network dengan Media Pengiriman Data nRF24L01 Muhammad Khatib Barokah; Ari Kusyanti; Mochammad Ali Fauzi
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 9 (2019): September 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (653.845 KB)

Abstract

nRF24L01 is a data communication module commonly used on Wireless Sensor Network (WSN) devices. This communication module is often used because of its low power consumption and using little memory. The nRF24L01 module sends data by broadcasting it into an address. To receive data, the nRF24L01 module listen at the same address as well. However, this will create a vulnerability if the device is used to send data only to designated device. Therefore, a solution is needed to secure the data in the module such as implementing the Grain-128 algorithm. Grain-128 algorithm is an encryption algorithm that is designed to be implemented on hardware that requires limited resources. The Grain-128 algorithm is a variant of the Grain algorithm family. Grain-128 algorithm is a stream cipher where this algorithm requires 128 bit key input and 96 bit Initialization Vector (IV). That way, this study uses the Grain-128 algorithm to secure data communication with the nRF24L01 module in terms of confidentiality. Based on testing, the system takes 41363,25 micro seconds to generate keystream. The system also requires 12.02 and 12.26 micro seconds to encrypt and decrypt 8 bit data. The system is vulnerable to active attack but invulnerable to passive attack.
Implementasi OWASP Mobile Security Testing Guide (MSTG) Untuk Pengujian Keamanan Pada Aplikasi Berbasis Android Luqman Hakim Yumnun; Ari Kusyanti; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 11 (2019): November 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (581.174 KB)

Abstract

OWASP Mobile Security Testing Guide (MSTG) is a method that can be used for security testing on mobile device applications both based on iOS and Android operating systems. Security testing is needed to minimize vulnerabilities in an application. However, there is currently no security testing application that applies OWASP MSTG, so this research will create a security testing system that applies OWASP MSTG. In the requirement analysis process there are 11 functional requirements while the design phase will make the system design, interface design, and algorithm design. This system is implemented on a web-based using CodeIgniter framework. On system testing, the system is tested by functional testing and validation testing by comparing the results of the system that has been made with existing security testing applications. Based on the system testing, the security testing system OWASP MSTG has been running and accordance with the system design stage.
Implementasi Algoritme SIMON untuk Enkripsi dan Dekripsi Berbasis QR Code Ngr. Putu Raka Novandra Asta; Ari Kusyanti; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 11 (2019): November 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (611.999 KB)

Abstract

Some advantages of e-payment model is the form of use of use of time, energy, and efficient. Positive and significant effects have been inflicted on this payment against the trade of goods and services. On the other hand it has been found in the field that there is data tapping by hackers disguised as customers to hack customer data. To prevent data from being hacked required a method to ensure data is kept secure. Cryptography and QR Code are methods for data to be secure. The research objective is to implement the SIMON algorithm 32 & 64 for a simple QR Code payment in the form of mobile application software. This research results that the implementation of SIMON 32 & 64 algorithm for QR Code payment can function to secure data. The results of other studies show that the validation of the plaintext and ciphertext based on the SIMON test vector shows that the results are the same as the SIMON test vector. Through encryption processing and decryption shows the total key expansion time is 5.3 seconds. The Total encryption time is 4.7 seconds. The Total key expansion decryption time is 5.3 seconds. Total Decryption Process is 2.1 seconds.
Co-Authors Adam Syahputra Adhitya Bhawiyuga Aditya Bhawiyuga Aditya Rachmadi Admaja Dwi Herlambang Agung Pambudi Agung Setia Budi Ahmad Faiz Ajeng Nurrohmah Alan Maulana Hamid Aldila Amalia Saufika Alex Sandro Irawan Ali Arifin Ami Fajar Hikmah Andhika Brahmana Putra Andi Reza` Perdanakusuma Andy Jaya Hartanto Angger Ramadhan Aniela Cahya Ningroem Apriyanto Tobing Arimbi Dewayanti Arsana Yudistira Arya Seta Bagaswara Aryo Pinandito Atika Baladina Audi Fauzan Septano Aulia Rizqy Pratama Bagus Priyambada Bagus Satria Wiguna Bhaskara Vito Tarigan Candra Emelia Fransisca Cindy Farah Safira Dany P Kartikasari Dany Primanita Kartikasari David Christanto Dian Astika Rini Dimas Dwi Radhityo Dita Nurina Malinda Dwi Qunita Putri Ambeq Paramarta Enrico Dimas Darmawan Evi Oktavia Kurniawati Fairuz Risky Yusniasari Fani Madina Fanny Aulia Rifki Fariz Andri Bachtiar Fariz Andri Bakhtiar Fida Royani Firlhi Kurniawan Firman Eko Purnomo Fitra Abdurrachman Bachtiar Fitra Firdaus Fredianto Fredianto Gibran Akbaromi Luhkito Hadyan El Aufar Halimah Septya Mikayla Hanaria Rotua Tampubolon Harin Puspa Ayu Catherina Helmy Rafi Nawawi Heru Nurwarsito Hilman Adi Kartika Himawat Aryadita I Putu Agrahita Wiguna Indriyana Liliasari Rahma Yusvi Irfan Arif Afandi Iskar Maulana Ismiarta Aknuranda Ivan Faturahman Iwi Suharti Izzati Dalilah Jihad Kamilullah Julio Dimitri Fredrik Kalbuadi Joyoputro Karmila Dewi Sulistyowati Kasyful Amron Kasyful Amron Khusnatul Mukaromah Lina Andreina Luqman Hakim Yumnun Lutfi Fanani Luthfi Maulana M. Ali Fauzi Mabda Amnesti Hananto Maharani Essraningtiyas Mahendra Data Mega Noviany Mega Shero Gayatrie Mochamad Chandra Saputra Mochammad Hannats Hanafi Ichsan Mochammad Valdi Fuadi Moh. Afif Ma'ruf Moh. Ahsani Taqwim Mohammad Fachry Muhammad Adi Wijaya Muhammad Alvian Syahputra Muhammad Faizal Ismail Muhammad Iqbal Rofi'i Muhammad Isfa Hany Muhammad Khatib Barokah Muhammad Nurul Fanani Muhammad Thareq Parsaulian Beyri Muhammad Wahyu Rizqi Pratama Muhammad Zainul Mubarok Nadya Puspitasari Ngr. Putu Raka Novandra Asta Nico F. Sitorus Niken Hendrakusma Wardani Ninscha Adisti Oktivianet Novia Dwi Setyaningrum Novita Krisma Diarti Nungki Dwi Prastanti Nur Azizah Mutmainnah Nuretha Hevy Purwaningtyas Nurjannah Nurjannah Nurma Abadi Firjatulloh Nurovi Andiyani Nurul Syamsi Ekowati Odytri Caesar Mahayani Okta Dwi Ariska Olivia Very Noorlinda Panji Mansyur Ansyah Pramasita Gustiarum Pramukantoro, Eko Sakti Primantara Hari Trisnawan Puspita Ainunnazahah Rafi Fajar Hidayat Raka Kurnia Novriantama Rakhmadhany Primananda Randyka Rusniantoro Ratna Khansa Anantika Retno Indah Rokhmawati Retno Nizma'urrahmi Reza Andria Siregar Reza Andria Siregar Richie Mahfud Ahmed Sambora Rifa Izza Nurlita Rika Mardatilla Rivai Fansuri Nasution Rizal Dismantoro Rizka Amalia Kurniawati Rizki Nanda Mustaqim Rohbi Visdya Harris Chandra Sabriansyah Rizqika Akbar Sandy Ramadhan Wijaya Sara Yosephina Sartika Amalia Sastra Ginata Sepdiyah Ayu Ningrum Septian Visiano Handoko Suhadak Akbar Supraptoa Supraptoa Syahifudin Shahid Syahmi Rifqi Hudha Perwira Tista Pamungkas Ragil Alit Widhi Yahya Wijaya Kurniawan Winda Ayu Safitri Yazid Yazid Yoga Rizwan Priyatna Yogi Anugrah Yohanes Heryka Febriarso Yulius Adi Pratama Yuniar Siska Fatmala Yusi Tyroni Mursityo Yustiyana April Lia Sari Zuroul Mufarokah