Articles
PENGAMANAN DATA NILAI PADA APLIKASI E-RAPORT BERDASARKAN ALGORITMA 2DES
Indra Williamsyah Sinaga;
Imam Saputra;
Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1604
E-Raport application is an effort to control the quality of assessment, given the limitations of existing resources and qualifications. Value data in E-Raport is a matter of confidentiality that is very guarded to avoid irresponsible parties. One solution to the problem above is to encode the e-raport database record so that the value data can be maintained and confidentiality protected. One of the algorithms that can be applied is the Double Data Encryption standard (2DES). By applying the 2DES algorithm the value data in the E-Raport application is protected from other irresponsible parties and the assessment system can run well and the value data can only be accessed by users who are has access rights to process the data value.Keywords: Value Data, E-Raport, Cryptography, 2DES algorithm
IMPLEMENTASI ALGORITMA SPRITZ DAN SPREAD SPECTRUM UNTUK MENYEMBUYIKAN PESAN ENKRIPSI KEDALAM FILE AUDIO MP3
Muhammad Iqbal;
Taronisokhi Zebua;
Ronda Deli Sianturi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1631
Optimizing the security of confidential text messages is very important to protect the contents of messages from those who want to use or damage the message. The use of cryptographic techniques in securing data can still raise suspicion of the message that has been secured. This study explores how to use steganography techniques to coat encrypted message security based on steganography techniques. The spritz algorithm is a cryptographic algorithm that is used to obtain the cipher from the original message, while the spread spectrum method is a method used to hide the original data password into an image. Based on testing done by combining these two techniques, it is quite reliable to optimize the security of secret messages because others cannot see the existence of the cipher of the original data in plain sight.Keywords: Cryptography, Steganography, Spritz, Spread Spectrum, mp3
IMPLEMENTASI ALGORITMA PAILLIER CRYPTOSYSTEM PENGAMANAN CITRA DIGITAL PADA APLIKASI CHAT
Juni Ade Nawer Purba;
Taronisokhi Zebua;
Rivalri K Hondro
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1605
Chat application allows easily users to exchange information in the form of text, images, video and audio. Information that is distributed can be either confidential or not confidential. However, at this time there is often attack on to information that is communicated through communication media such as chat, so that it is possible for other people to misuse the information. The use of algorithms from cryptographic techniques in securing distributed information. This research discusses how to use the cryptosystem pailler algorithm to secure digital images that are distributed through chat applications. This algorithm is very resistant to solving because n-residue class calculations are believed to be very difficult to compute, so as to maintain the security of images distributed through chat applications.Keywords: Cryptography, Paillier Cryptosystem, Chatting, Digital Image, Communication
IMPLEMENTASI ALGORITMA ADVANCED ENCRYPTION STANDARD DAN TRIPLE DATA ENCRYPTION STANDARD UNTUK MENGAMANKAN CITRA DIGITAL
Mahadi Winafil;
Sinar Sinurat;
Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v2i1.975
Digital images that are personal and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if distributed via the internet network such as on Facebook, WhatsApp and e-mail chat based applications. Images that are sent sometimes are often confidential images and must be maintained. In order to maintain the security of digital images can be done by utilizing cryptographic techniques. Cryptographic techniques can secure digital images by changing pixel values from digital images so as to produce different pixel values from the original image to be secured. This research will use AES 128 bit and Triple DES methods for encryption and decryption of digital images on client-server based applications. The results of the encryption AES algorithm will be re-encrypted with the Triple DES Algorithm so as to produce pixel values that are far different from the original pixel values. Keywords: cryptography, image, AES, Triple DES
PERANCANGAN DAN IMPLEMENTASI ALGORITMA ELIAS GAMMA CODE UNTUK MENGKOMPRESI RECORD DATABASE PADA APLIKASI RANGKUMAN PENGETAHUAN UMUM LENGKAP
Hikka Sartika;
Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1600
Storage space required by an application is one of the problems on smartphones. This problem can result in a waste of storage space because not all smartphones have a very large storage capacity. One application that has a large file size is the RPUL application and this application is widely accessed by students and the general public. Large file size is what often causes this application can not run effectively on smartphones. One solution that can be used to solve this problem is to compress the application file, so that the size of the storage space needed in the smartphone is much smaller. This study describes how the application of the elias gamma code algorithm as one of the compression technique algorithms to compress the RPUL application database file. This is done so that the RPUL application can run effectively on a smartphone after it is installed. Based on trials conducted on 64 bit of text as samples in this research it was found that compression based on the elias gamma code algorithm is able to compress text from a database file with a ratio of compression is 2 bits, compression ratio is 50% with a redundancy is 50%. Keywords: Compression, RPUL, Smartphone, Elias Gamma Code
SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN INTERNET SERVICE PROVIDER MENERAPKAN METODE ELIMINATION AND CHOICE TRANSLATION REALITY (ELECTRE)
Ismay Dahanum;
Mesran Mesran;
Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v1i1.506
Internet users find it difficult to compare and know the quality of services provided by Internet Service Providers (ISP), most Internet users choose an Internet Service Provider (ISP) based on the experience and advice of other users. This is not necessarily appropriate to the needs, because a valid decision must be considered and taken into account from the criteria available to obtain a decision. Decision support systems are designed to help decision making and are interpreted as a datadriven model system that has procedures in data processing and data processing results used to make a decision. Therefore, with the construction of decision support systems can help Internet users in making more efficient decisions. The method used in decision support systems is Elimintaion And Choice Translation Realty (ELECTRE). with the establishment of an Internet Service Provider (ISP) decision support system by applying the ELECTRE method that is expected to assist internet users in determining the Internet Service Provider (ISP) that suits their needs.
IMPLEMENTASI METODE EVEN-RODEH CODE UNTUK KOMPRESI KITAB UNDANG-UNDANG HUKUM PIDANA (KUHP) BERBASIS ANDROID
Nopiyah Belia Batubara;
Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1578
Smartphones in addition to being a smartphone communication tool also functions as a tool for finding information. One application that is currently widely used by students and the public is KUHP application that run in mobile. KUHP application is an application that contains material of criminal laws. The KUHP application has large material and is stored in the application database after it is installed. The large size of the database of the Criminal Code application causes the need for large memory space at mobile. This has become one of the causes of smartphone memory performance to be reduced and slow. Compression technique can be used as a solution to the problem above. Compression aims to compress large data sizes into smaller ones, so that the required storage space decreases. This study describes how to do the compression process of the KUHP application material based on the Even Rodeh Code algorithm. Based on the results of tests conducted to compress 280 bits of data, it was found that the size of the data after being compressed was 176 bits, with compression ratio is 62.8%, ratio of compression is 1.59 bits, and redundancy is 37.2%.Keywords: Compression, KUHP Aplication, Even Rodeh Code, Database
Implementasi Algoritma Mars Pada Penyandian Record Database
Alimah Alimah;
Nelly Astuti Hasibuan;
Taronisokhi Zebua
Bulletin of Information Technology (BIT) Vol 1 No 1: Maret 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (802.855 KB)
Database records in the form of text are very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of database records, it can be done by using cryptographic techniques. Cryptographic techniques can encode database records by encrypting them in the form of passwords that are not understood. The Mars algorithm is an algorithm that uses a 128-bit key and the encryption process consists of 32 rounds. This symmetry algorithm will produce a higher level of security against the database record because it can encode it into a password with a fairly complex process that will make it difficult for cryptanalysts to access the image. This research uses the Mars Algorithm for the encryption and decryption process, so that in the process it is necessary to go through several long steps in order to produce the final cipher. This research describes the process of securing a database record by encoding it based on the Mars algorithm, in the form of a password that is difficult for others to understand and understand. This is done in an effort to minimize acts of misuse of database records
How to Create and Randomize a Vegenere Cipher Key Based on the Key Procedure of RC4+ Algorithm
Taronisokhi Zebua;
Eferoni Ndruru
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (368.932 KB)
|
DOI: 10.30865/ijics.v3i2.1404
The security of data not only depends on the complexity of the algorithm used, but one of the more important things to safeguard is key. The vegenere cipher algorithm is one of the common and easy to implement algorithms, but this algorithm is very easy to break with kasiki techniques by analyzing the word of cipher and keyword that have repetitive patterns. The RC4+ algorithm has the advantage of generating and generating fairly random keys. This research describes how to use the RC4+ key generation procedure to create and randomized the keys used in the vegenere cipher algorithm, to decrease recurrence of the same character of the cipher and character of the key
Implementation of Triple Transposition Vegenere Cipher Algorithm and Cipher Block Chaining for Encoding Text
Fitarius Humendru;
Taronisokhi Zebua
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (274.421 KB)
|
DOI: 10.30865/ijics.v2i1.997
Security of confidential text data and personal is very important so that the data is not misused by other parties. Many cryptographic algorithms can be used to secure data to keep the originality of confidential data. This study describes the use of triple transposition vegenere cipher algorithm which is combined with cipher block chaining mode for encoding text data with the aim to optimizing randomize of ciphers generated so that the security of confidential of data text is more optimal