Claim Missing Document
Check
Articles

Found 2 Documents
Search

Cryptography With McEliece Algorithm (Code Based Cryptography) Priska Gultom; Melita Sidauruk; Arlan Lombu; Histori Mei Selamat Gulo
Jurnal Teknik Indonesia Vol. 2 No. 01 (2023): Jurnal Teknik Indonesia (JU-TI) Juni, 2023
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/ju-ti.v2i01.663

Abstract

The McEliece algorithm is one of the code-based cryptography methods that offers a high level of security, especially against quantum computing threats. This algorithm uses error-correcting codes to encrypt messages, making them difficult to crack by conventional cryptanalysis attacks. This study analyzes the implementation of the McEliece algorithm through manual calculations and simulations using the Python programming language. The results of the analysis show that this algorithm has a strong encryption mechanism, with the key formation, encryption, and decryption processes running according to theory. In addition, the use of error-correcting codes has proven effective in repairing messages that are disrupted during transmission. The program implementation shows that McEliece can be applied in real scenarios with a high level of accuracy. With these advantages, the McEliece algorithm is a strong candidate for post-quantum security systems.
Implementasi dan Analisis Keamanan Layanan SSH Server Menggunakan Autentikasi RSA dalam Lingkungan Virtualisasi dan Putty Tarcisio Jeremya; Arlan Lombu; Laurenzio Daeli; Steven Bulolo
JITKO : Jurnal Inovasi Teknologi dan Komputer Vol. 3 No. 1 (2025): Jurnal Inovasi Teknologi dan Komputer(JITKO)
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jitko.v3i1.143

Abstract

Penelitian ini bertujuan untuk mengimplementasikan dan menganalisis keamanan layanan Secure Shell (SSH) pada server Debian 10 menggunakan metode autentikasi berbasis algoritma RSA. Penelitian ini membandingkan tingkat keamanan antara autentikasi berbasis password dengan autentikasi kunci publik (public key). Metode yang digunakan meliputi konfigurasi SSH server, pembuatan pasangan kunci RSA 4096-bit, serta pengujian melalui simulasi serangan brute-force dan analisis log sistem dalam lingkungan virtualisasi. Hasil pengujian menunjukkan bahwa autentikasi berbasis RSA mampu meningkatkan keamanan sistem secara signifikan, ditunjukkan dengan tidak berhasilnya serangan brute-force menembus sistem serta waktu autentikasi yang lebih efisien dibandingkan metode password. Selain itu, mekanisme ini menghilangkan kebutuhan pengiriman kredensial sensitif melalui jaringan. Dengan demikian, implementasi RSA pada layanan SSH terbukti efektif dalam meningkatkan keamanan dan efisiensi akses jarak jauh pada server.