Articles
            
            
            
            
            
                            
                    
                        IMPLEMENTASI METODE VIKOR DALAM PENERIMAAN JURNALIS PADA KORAN WASPADA MEDAN 
                    
                    Soraya Rahma Hayati; 
Mesran Mesran; 
Taronisokhi Zebua; 
Heri Nurdiyanto; 
Khasanah Khasanah                    
                     KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era  
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/komik.v2i1.905                            
                                            
                    
                        
                            
                            
                                
The reception of journalists at the Waspada Daily Medan always went through several rigorous selections before being determined to be accepted as journalists at the Waspada Medan Daily. There are several criteria that must be possessed by each participant as a condition for becoming a journalist in the Daily Alert Medan. To get the best participants, the Waspada Medan Daily needed a decision support system. Decision Support Systems (SPK) are part of computer-based information systems (including knowledge-based systems (knowledge management)) that are used to support decision making within an organization or company. Decision support systems provide a semitructured decision, where no one knows exactly how the decision should be made. In this study the authors applied the VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) as the method to be applied in the decision support system application. The VIKOR method is part of the Multi-Attibut Decision Making (MADM) Concept, which requires normalization in its calculations. The expected results in this study can obtain maximum decisions.Keywords: Journalist Acceptance, Decision Support System, VIKOR
                            
                         
                     
                 
                
                            
                    
                        Modifikasi Vigenere Cipher Dengan Pembangkit Kunci Blum Blum Shub 
                    
                    Firman Telaumbanua; 
Taronisokhi Zebua                    
                     KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation 
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/komik.v4i1.2646                            
                                            
                    
                        
                            
                            
                                
Vigenere cipher is a symmetric key algorithm that uses alphabetic substitution by using these letters as plaintext and key letters that have comparable positions. Along with the development of human science, the weaknesses of the vigenere cipher were discovered. One way that can be done to overcome the weaknesses of the vigenere cipher above is to generate a more random key. This study describes how the procedure is carried out to modify the key generation used in the vigenere cipher algorithm. The key generation process is carried out based on the blum blum shub key generator, meaning that the key used in the encryption and decryption process is the key generated based on the blum blum shub key generator, so that the modification process carried out in generating the key can minimize key-breaking actions by other parties as well as This algorithm can be more optimal in securing data. The result of this research is to design an android-based data security application using the modified vigenere cipher method using the blum blum shub key generator. This application can be used to secure text data, so that it cannot be retrieved by other people. In addition, the application to be designed is easier to use in data security.Keywords: Security, Keys, Algorithm, Cryptography, Blum Blum Shup
                            
                         
                     
                 
                
                            
                    
                        PENGAMANAN DATA NILAI PADA APLIKASI E-RAPORT BERDASARKAN ALGORITMA 2DES 
                    
                    Indra Williamsyah Sinaga; 
Imam Saputra; 
Taronisokhi Zebua                    
                     KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis 
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/komik.v3i1.1604                            
                                            
                    
                        
                            
                            
                                
E-Raport application is an effort to control the quality of assessment, given the limitations of existing resources and qualifications. Value data in E-Raport is a matter of confidentiality that is very guarded to avoid irresponsible parties. One solution to the problem above is to encode the e-raport database record so that the value data can be maintained and confidentiality protected. One of the algorithms that can be applied is the Double Data Encryption standard (2DES). By applying the 2DES algorithm the value data in the E-Raport application is protected from other irresponsible parties and the assessment system can run well and the value data can only be accessed by users who are has access rights to process the data value.Keywords: Value Data, E-Raport, Cryptography, 2DES algorithm
                            
                         
                     
                 
                
                            
                    
                        IMPLEMENTASI ALGORITMA SPRITZ DAN SPREAD SPECTRUM UNTUK MENYEMBUYIKAN PESAN ENKRIPSI KEDALAM FILE AUDIO MP3 
                    
                    Muhammad Iqbal; 
Taronisokhi Zebua; 
Ronda Deli Sianturi                    
                     KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis 
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/komik.v3i1.1631                            
                                            
                    
                        
                            
                            
                                
Optimizing the security of confidential text messages is very important to protect the contents of messages from those who want to use or damage the message. The use of cryptographic techniques in securing data can still raise suspicion of the message that has been secured. This study explores how to use steganography techniques to coat encrypted message security based on steganography techniques. The spritz algorithm is a cryptographic algorithm that is used to obtain the cipher from the original message, while the spread spectrum method is a method used to hide the original data password into an image. Based on testing done by combining these two techniques, it is quite reliable to optimize the security of secret messages because others cannot see the existence of the cipher of the original data in plain sight.Keywords:  Cryptography, Steganography, Spritz, Spread Spectrum, mp3
                            
                         
                     
                 
                
                            
                    
                        IMPLEMENTASI ALGORITMA PAILLIER CRYPTOSYSTEM PENGAMANAN CITRA DIGITAL PADA APLIKASI CHAT 
                    
                    Juni Ade Nawer Purba; 
Taronisokhi Zebua; 
Rivalri K Hondro                    
                     KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis 
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/komik.v3i1.1605                            
                                            
                    
                        
                            
                            
                                
Chat application allows easily users to exchange information in the form of text, images, video and audio. Information that is distributed can be either confidential or not confidential. However, at this time there is often attack on to information that is communicated through communication media such as chat, so that it is possible for other people to misuse the information. The use of algorithms from cryptographic techniques in securing distributed information. This research discusses how to use the cryptosystem pailler algorithm to secure digital images that are distributed through chat applications. This algorithm is very resistant to solving because n-residue class calculations are believed to be very difficult to compute, so as to maintain the security of images distributed through chat applications.Keywords: Cryptography, Paillier Cryptosystem, Chatting, Digital Image, Communication
                            
                         
                     
                 
                
                            
                    
                        IMPLEMENTASI ALGORITMA ADVANCED ENCRYPTION STANDARD DAN TRIPLE DATA ENCRYPTION STANDARD UNTUK MENGAMANKAN CITRA DIGITAL 
                    
                    Mahadi Winafil; 
Sinar Sinurat; 
Taronisokhi Zebua                    
                     KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era  
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/komik.v2i1.975                            
                                            
                    
                        
                            
                            
                                
Digital images that are personal and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if distributed via the internet network such as on Facebook, WhatsApp and e-mail chat based applications. Images that are sent sometimes are often confidential images and must be maintained. In order to maintain the security of digital images can be done by utilizing cryptographic techniques. Cryptographic techniques can secure digital images by changing pixel values from digital images so as to produce different pixel values from the original image to be secured. This research will use AES 128 bit and Triple DES methods for encryption and decryption of digital images on client-server based applications. The results of the encryption AES algorithm will be re-encrypted with the Triple DES Algorithm so as to produce pixel values that are far different from the original pixel values. Keywords: cryptography, image, AES, Triple DES
                            
                         
                     
                 
                
                            
                    
                        PERANCANGAN DAN IMPLEMENTASI ALGORITMA ELIAS GAMMA CODE UNTUK MENGKOMPRESI RECORD DATABASE PADA APLIKASI RANGKUMAN PENGETAHUAN UMUM LENGKAP 
                    
                    Hikka Sartika; 
Taronisokhi Zebua                    
                     KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis 
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/komik.v3i1.1600                            
                                            
                    
                        
                            
                            
                                
Storage space required by an application is one of the problems on smartphones. This problem can result in a waste of storage space because not all smartphones have a very large storage capacity. One application that has a large file size is the RPUL application and this application is widely accessed by students and the general public. Large file size is what often causes this application can not run effectively on smartphones. One solution that can be used to solve this problem is to compress the application file, so that the size of the storage space needed in the smartphone is much smaller. This study describes how the application of the elias gamma code algorithm as one of the compression technique algorithms to compress the RPUL application database file. This is done so that the RPUL application can run effectively on a smartphone after it is installed. Based on trials conducted on 64 bit of text as samples in this research it was found that compression based on the elias gamma code algorithm is able to compress text from a database file with a ratio of compression is 2 bits, compression ratio is 50% with a redundancy is 50%. Keywords: Compression, RPUL, Smartphone, Elias Gamma Code
                            
                         
                     
                 
                
                            
                    
                        SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN INTERNET SERVICE PROVIDER MENERAPKAN METODE ELIMINATION AND CHOICE TRANSLATION REALITY (ELECTRE) 
                    
                    Ismay Dahanum; 
Mesran Mesran; 
Taronisokhi Zebua                    
                     KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality 
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/komik.v1i1.506                            
                                            
                    
                        
                            
                            
                                
Internet users find it difficult to compare and know the quality of services provided by Internet Service Providers (ISP), most Internet users choose an Internet Service Provider (ISP) based on the experience and advice of other users. This is not necessarily appropriate to the needs, because a valid decision must be considered and taken into account from the criteria available to obtain a decision. Decision support systems are designed to help decision making and are interpreted as a datadriven model system that has procedures in data processing and data processing results used to make a decision. Therefore, with the construction of decision support systems can help Internet users in making more efficient decisions. The method used in decision support systems is Elimintaion And Choice Translation Realty (ELECTRE). with the establishment of an Internet Service Provider (ISP) decision support system by applying the ELECTRE method that is expected to assist internet users in determining the Internet Service Provider (ISP) that suits their needs.
                            
                         
                     
                 
                
                            
                    
                        IMPLEMENTASI METODE EVEN-RODEH CODE UNTUK KOMPRESI KITAB UNDANG-UNDANG HUKUM PIDANA (KUHP) BERBASIS ANDROID 
                    
                    Nopiyah Belia Batubara; 
Taronisokhi Zebua                    
                     KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis 
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/komik.v3i1.1578                            
                                            
                    
                        
                            
                            
                                
Smartphones in addition to being a smartphone communication tool also functions as a tool for finding information. One application that is currently widely used by students and the public is KUHP application that run in mobile. KUHP application is an application that contains material of criminal laws. The KUHP application has large material and is stored in the application database after it is installed. The large size of the database of the Criminal Code application causes the need for large memory space at mobile. This has become one of the causes of smartphone memory performance to be reduced and slow. Compression technique can be used as a solution to the problem above. Compression aims to compress large data sizes into smaller ones, so that the required storage space decreases. This study describes how to do the compression process of the KUHP application material based on the Even Rodeh Code algorithm. Based on the results of tests conducted to compress 280 bits of data, it was found that the size of the data after being compressed was 176 bits, with  compression ratio is 62.8%, ratio of compression is 1.59 bits, and redundancy is 37.2%.Keywords: Compression, KUHP Aplication, Even Rodeh Code, Database
                            
                         
                     
                 
                
                            
                    
                        Implementasi Algoritma Mars Pada Penyandian Record Database 
                    
                    Alimah Alimah; 
Nelly Astuti Hasibuan; 
Taronisokhi Zebua                    
                     Bulletin of Information Technology (BIT) Vol 1 No 1: Maret 2020 
                    
                    Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT) 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                    |
                            
                            
                                Full PDF (802.855 KB)
                            
                                                                    
                    
                        
                            
                            
                                
Database records in the form of text are very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of database records, it can be done by using cryptographic techniques. Cryptographic techniques can encode database records by encrypting them in the form of passwords that are not understood. The Mars algorithm is an algorithm that uses a 128-bit key and the encryption process consists of 32 rounds. This symmetry algorithm will produce a higher level of security against the database record because it can encode it into a password with a fairly complex process that will make it difficult for cryptanalysts to access the image. This research uses the Mars Algorithm for the encryption and decryption process, so that in the process it is necessary to go through several long steps in order to produce the final cipher. This research describes the process of securing a database record by encoding it based on the Mars algorithm, in the form of a password that is difficult for others to understand and understand. This is done in an effort to minimize acts of misuse of database records