Claim Missing Document
Check
Articles

Message Security on Chat App based on Massey Omura Algorithm Taronisokhi Zebua; Rivalri Kristianto Hondro; Eferoni Ndruru
IJISTECH (International Journal of Information System and Technology) Vol 1, No 2 (2018): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v1i2.11

Abstract

Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed
SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN PERUMAHAN DENGAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) Hartika Manao; Berto Nadeak; Taronisokhi Zebua
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 1, No 2 (2017): Juni 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v1i2.327

Abstract

Housing is a basic human need and needs to be nurtured and developed for the sake of the continuity and improvement of people's lives and settlements that can not be seen as a means of necessity solely, but more than that is the process of human settlements in creating a space of life to socialize themselves in expressing their identity. During this time customers make housing selection based on information from others, observing housing and experience by not considering the criteria needed so often cause new problems for the customer after buying housing. Problems such as inconvenience, credit installment problems and so forth. Decision support systems are generally defined as a system capable of producing solutions and problem- solving. Decision support systems are not intended to replace decision-making roles, but to assist and support decision makers. One of the most commonly used methods in decision support systems is the simple additive weighting (SAW) method. This simple additive weighting method can determine the preference value of each alternative, then perform the warfare process that can select the best alternative from a number of alternatives available.
Aplikasi Saran Buku Bacaan Bagi Pengunjung Perpustakaan AMIK STIEKOM Sumatera Utara Berdasarkan Algoritma Brute Force Taronisokhi Zebua; Natalia Silalahi
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 3 (2018): Edisi Juli
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v3i0.67

Abstract

Service of information about books in a library is very helpful and makes it easier for visitors to find the book they want to find. Presentation of information on books available in the library of AMIK Stiekom North Sumatra has not been effective and efficient, because it is still done by looking at the library employee records on the list of books that have been provided. This problem becomes one of the factors to decrease interest in reading the library visitors. Utilization of application suggestions reading books in the library of AMIK Stiekom North Sumatra can be used as a trigger of the interest of visitors to keep reading books available in the library. The built-in book suggestion app works based on brute-force algorithms so that it can present book information relevant to the topic being searched by the visitors.
Message Security on Chat App based on Massey Omura Algorithm Taronisokhi Zebua; Rivalri Kristianto Hondro; Eferoni Ndruru
IJISTECH (International Journal of Information System and Technology) Vol 1, No 2 (2018): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (189.109 KB) | DOI: 10.30645/ijistech.v1i2.11

Abstract

Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed
Penerapan Algoritma Gost Dan Mode Output Feedback Untuk Tingkat Keamanan Citra Digital Sri Wahyuni; Surya Darma Nasution; Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.128

Abstract

Digital images that are private and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if it is distributed over the internet such as chat-based applications, WhatsApp and e-mail media. The image that is sent is sometimes an image that is confidential and must be protected. In order to maintain the security of digital images, cryptographic techniques can be used. Cryptographic techniques can secure digital images by changing the pixel values ??of the digital image so that it produces a different pixel value from the original image to be secured. In this study, the algorithm used is the GOST algorithm by adding the OFB technique to optimize the GOST key, and the encryption results can be sent via an application that will be designed with a client-server model. Creating a client-server-based encryption and decryption software application, aimed at transferring digital data in the form of a plain image that has been encrypted using the GOST algorithm, and can be distributed locally using an IP address connected to the same network on the sending and receiving computers (client-server)
Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen Berliana Oktaviani Sinaga; Sinar Sinurat; Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.130

Abstract

Confidential document files must have security both when the file process is sent or stored in the stroge media. This is done so that the confidential document file is not known by someone who does not have authority over the file, or to avoid loss if the file falls into the wrong hands. In order to achieve this, a document file security technique is needed that can convert document file data into unrecognized data. One of the techniques that can be used is cryptography. Cryptography makes use of algorithms to encode document files with an encryption process, and restore document files with a decryption process. One of the algorithms that can be used is the XTEA algorithm. XTEA divides the document file string into 2 parts, namely AL 32 bit and BL 32 bit. The weakness of the XTEA algorithm when carrying out the encryption or decryption process with repeated key scheduling so that it is not effective in optimizing the security of encrypted document files, therefore in this study the Linear Congruential Generator (LCG) method is added to generate XTEA keys. LCG has values ??a, c, m and X0 which triggers to get the XTEA key. So that in the process of distributing encrypted document files, the key sent is the LCG trigger value in the form of a, c, m and X0, if the value is known by the attacker, the encrypted document file cannot be returned. So that the results of the XTEA encryption algorithm with key optimizer based on the LCG method produce a document file cipher that is more optimal in security
SISTEM INFORMASI ABSENSI MAHASISWA STMIK BUDI DARMA MEDAN BERBASIS WEB MOBILE Taronisokhi Zebua; Pristiwanto Pristiwanto
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.480

Abstract

Pendataan kehadiran atau absensi mahasiswa sangat penting dalam pelaksanaan kegiatan akademik pada setiap perguruan tinggi termasuk di STMIK Budi Darma Medan. Masalah yang sering terjadi selama ini adalah banyaknya kesalahan penginputan jumlah kehadiran mahasiswa ke dalam sistem informasi akademik kampus yang dilakukan oleh pegawai program studi. Kesalahan tersebut sangat berpengaruh pada penentuan keikutsertaan mahasiswa pada ujian akhir semester maupun pada penetapan nilai ujian akhir mahasiswa pada Kartu Hasil Studi (KHS) oleh dosen pengampu matakuliah. Hal inilah yang menjadi salah satu faktor terjadinya complain nilai akhir ujian semester dari mahasiswa kepada program studi maupun dosen pengampu matakuliah. Salah satu solusi yang dianggap efektif untuk menyelesaikan permasalahan di atas adalah membangun sebuah layanan informasi absensi mahasiswa berbasis web yang langsung dapat diakses oleh masing-masing dosen pada saat melaksanakan absensi mahasiswa. Layanan ini diyakini sangat membantu entitas yang berperan dalam pengolahan data absensi kehadiran mahasiswa menjadi informasi yang lebih akurat. Layanan ini juga dapat dimanfaatkan oleh orangtua mahasiswa untuk mengontrol dan mengetahui kehadiran anaknya.
TEKNIK PENYEMBUNYIAN PESAN TEKS TERENKRIPSI ALGORITMA MERKLE-HELLMAN KNAPSACK MENGGUNAKAN METODE PIXEL VALUE DIFFERENCING KE DALAM CITRA DIGITAL Agung Lestari; Abdul Sani Sembiring; Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1590

Abstract

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image
IMPLEMENTASI METODE VIKOR DALAM PENERIMAAN JURNALIS PADA KORAN WASPADA MEDAN Soraya Rahma Hayati; Mesran Mesran; Taronisokhi Zebua; Heri Nurdiyanto; Khasanah Khasanah
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v2i1.905

Abstract

The reception of journalists at the Waspada Daily Medan always went through several rigorous selections before being determined to be accepted as journalists at the Waspada Medan Daily. There are several criteria that must be possessed by each participant as a condition for becoming a journalist in the Daily Alert Medan. To get the best participants, the Waspada Medan Daily needed a decision support system. Decision Support Systems (SPK) are part of computer-based information systems (including knowledge-based systems (knowledge management)) that are used to support decision making within an organization or company. Decision support systems provide a semitructured decision, where no one knows exactly how the decision should be made. In this study the authors applied the VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) as the method to be applied in the decision support system application. The VIKOR method is part of the Multi-Attibut Decision Making (MADM) Concept, which requires normalization in its calculations. The expected results in this study can obtain maximum decisions.Keywords: Journalist Acceptance, Decision Support System, VIKOR
Modifikasi Vigenere Cipher Dengan Pembangkit Kunci Blum Blum Shub Firman Telaumbanua; Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2646

Abstract

Vigenere cipher is a symmetric key algorithm that uses alphabetic substitution by using these letters as plaintext and key letters that have comparable positions. Along with the development of human science, the weaknesses of the vigenere cipher were discovered. One way that can be done to overcome the weaknesses of the vigenere cipher above is to generate a more random key. This study describes how the procedure is carried out to modify the key generation used in the vigenere cipher algorithm. The key generation process is carried out based on the blum blum shub key generator, meaning that the key used in the encryption and decryption process is the key generated based on the blum blum shub key generator, so that the modification process carried out in generating the key can minimize key-breaking actions by other parties as well as This algorithm can be more optimal in securing data. The result of this research is to design an android-based data security application using the modified vigenere cipher method using the blum blum shub key generator. This application can be used to secure text data, so that it cannot be retrieved by other people. In addition, the application to be designed is easier to use in data security.Keywords: Security, Keys, Algorithm, Cryptography, Blum Blum Shup