Claim Missing Document
Check
Articles

Found 2 Documents
Search

Penerapan Algoritme Kriptografi RC6 Untuk Mengamankan File Penjualan Dan Gambar Produk Alisan Siswanto, Siswanto; Basuki Hari Prasetyo; M. Anif; Ari Saputro; Subandi; Djati Kusdiarto; Izzah Fadhilah Akmaliah
Prosiding SISFOTEK Vol 7 No 1 (2023): SISFOTEK VII 2023
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Problems that commonly occurred in this period were that the sales data for Alisan products in several stores was falsified and there were quite large differences that did not match the reported data, as well as the large number of fake product images which could damage the image of the original Alisan products. One of the main problems faced in developing e-commerce web applications is the vulnerability of sales data and product images to security threats, such as hacking and data theft. The aim of this research is to create an application that implements the RC6 encryption algorithm to protect web-based Alisan product sales files and product images. This research aims to fill this gap by focusing on the effectiveness of the Rivest Code 6 (RC6) algorithm in protecting critical transactional and visual data in an e-commerce context. In addition, this research examines the impact of RC6 implementation on system performance and compares it with other encryption methods commonly used in web applications. Therefore, this research is expected to provide valuable insights for stakeholders in developing better data security solutions for web-based businesses. Applications are evaluated and planned with user acceptance testing (UAT). The results of application testing showed that the average size of the encryption process was 146,878.6 bytes and the processing time was 3.576291 MS and the average size of the decryption process was 146,854.6 bytes and the processing time was 2.8220591 MS. Test results from 26 UAT respondents, 89.1% agreed that the entire implementation of the RC6 algorithm can be used by Alisan employees to protect sales report files and Alisan product image files easily and safely.
Pemberdayaan Calon Instruktur Dalam Memahami Materi Skema Associate Data Scientist Siswanto; Riefky Sungkar; Muhammad Anif; Ari Saputro; Subandi; Djati Kusdiarto; Wahyu Pramusinto; Hari Prasetyo, Basuki
Jurnal Pengabdian kepada Masyarakat TEKNO (JAM-TEKNO) Vol 4 No 2 (2023): Desember 2023
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/jamtekno.v4i2.5580

Abstract

At the Information & Communication Technology Training & Development Center (BPPTIK) Cikarang, Bekasi Regency, West Java, community service (PKM) was performed. BPPTIK is responsible for conducting competency assessments, certifying and accrediting government training facilities, and providing information and communication technology product services. The current issues facing PKM partners are as follows: teachers who are part of BPPTIK are now lacking in trainers to impart associate data scientist scheme material based on SKKNI, which includes knowledge, abilities, and attitudes. The goal of this training is to prepare aspiring instructors who are BPPTIK Cikarang members with the knowledge, abilities, and attitudes of the SKKNI-based associate data scientist scheme material so that instructors can deliver descriptions, curriculum, syllabus, teaching materials, and modules. In the UAT test, a questionnaire with a Likert scale of 5 has been used. As a result, the respondents agreed (above 79.24%) that overall the SKKNI-based associate data scientist scheme material training is interesting and understood by prospective associate data scientist instructors who are members of BPPTIK Cikarang.