cover
Contact Name
Frangky Silitonga
Contact Email
frangkyka@gmail.com
Phone
+6282286802835
Journal Mail Official
jurnalquancom@iteba.ac.id
Editorial Address
LPPM-Institut Teknologi Batam The Vitka City Complex Jl. Gajah Mada, Tiban, Batam, Kepulauan Riau, INDONESIA 29425
Location
Kota batam,
Kepulauan riau
INDONESIA
Jurnal Quancom: Jurnal Quantum Komputer
ISSN : 29881005     EISSN : 29880998     DOI : -
Jurnal Quantum Komputer adalah jurnal yang fokus pada bidang Teknik komputer atau rekayasa komputer khusus yang mengkombinasikan teknik elektro dan ilmu komputer. Jurnal ini secara konten akan mempublikasi berkaitan erat dengan perancangan, pengembangan dan sistem -sistem berbasis komputer. Artikel yang dapat diisi dalam jurnal Teknik Komputer ini mencakup: Internet of Things (IoT), Robotic, Artificial Intelligence, network. Jurnal ini akan terbit dua kali dalam setahun, pada Juni dan Desember
Articles 31 Documents
Perbandingan Performance Kriptografi RSA, RSA-CRT, Rabin dalam Proses Pengamanan Pesan Berbasis Teks Manalu, Deby Cynthia Rohara; Mutiara Enjelina; Sipayung, Johannes Bastian Jasa
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 2 No. 2 (2024): Desember 2024
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v2i2.417

Abstract

Data security is a critical aspect in the digital era, especially in securing text-based messages. This research compares the performance of three asymmetric cryptography algorithms-RSA, RSA-CRT, and Rabin-in terms of the speed and efficiency of the encryption and decryption process. The RSA (Rivest-Shamir Adleman) algorithm, one of the most popular cryptographic methods, uses two different keys (public and private) to encrypt and decrypt data, but has a weakness in decryption time efficiency on large data. RSA-CRT, as a modification of RSA with the Chinese Remainder Theorem approach, speeds up the decryption process by dividing large operations into smaller ones. Rabin's algorithm, which is based on prime factorization, shows high time efficiency for both encryption and decryption processes, although it produces four possible plaintexts that require additional selection. All three algorithms were tested using text data with varying character sizes, ranging from 100 to 10,000 characters. The test results show that RSA has the fastest encryption time, RSA-CRT excels in decryption, and Rabin offers the best overall efficiency for securing text-based data. This research provides algorithm recommendations according to system needs, taking into account the balance between efficiency and security.
Pengujian dan Analisis Teknik Steganografi Menggunakan Metode Playfair, ElGamal, dan LSB untuk Penyembunyian Data pada Gambar Digital dalam Aplikasi Modern Pardosi, Sion Saut Parulian; Manik, Melvayana; Situmorang, Irene Mutiara
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 2 No. 2 (2024): Desember 2024
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v2i2.422

Abstract

The rapid advancement of information and communication technology has significantly transformed how individuals interact and share information, particularly through digital media such as images. While offering numerous benefits, the ease of digital media manipulation poses serious challenges, including cybercrimes like phishing and cyberbullying, highlighting the need for reliable data protection methods to maintain information confidentiality. This research focuses on steganography, the art of concealing messages in such a way that only the sender and recipient are aware of the hidden information. The study implements the Least Significant Bit (LSB) technique for embedding secret files within digital images and evaluates its effectiveness across various transmission scenarios, including email and instant messaging applications like WhatsApp, Instagram, and Telegram. Additionally, the research incorporates cryptographic algorithms such as Playfair and ElGamal to enhance data security. The findings aim to provide insights into the strengths and weaknesses of these methodologies, ultimately contributing to the development of secure digital communication practices.
Analisis Kinerja Algoritma Hash pada Keamanan Data: Perbandingan Antara SHA-256, SHA-3, dan Blake2 Sinaga, Joice Sharon Gabriella; Nehemia Sitorus; Steven Lukas Samosir
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 2 No. 2 (2024): Desember 2024
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v2i2.432

Abstract

Data security is an essential aspect in the dynamic digital age, including protection of data integrity, confidentiality and authentication. This research evaluates the performance and security of three popular hash algorithms: SHA-256, SHA-3, and Blake2. Resistance to brute force attacks, avalanche effects, and processing time efficiency were analyzed. Results show that all algorithms have excellent resistance to brute force attacks, thanks to the 256-bit hash length. In terms of avalanche effect, SHA-3 shows higher consistency than the other algorithms, making it superior in maintaining data integrity. In terms of processing time efficiency, Blake2 performed best with the fastest hashing time, while SHA-256 offered balanced efficiency for general applications. SHA-3, although slower, has advantages in security and resistance to collision attacks. Overall, SHA-3 is recommended for applications with high security requirements, Blake2 is suitable for applications that prioritize efficiency, and SHA-256 remains relevant for applications that require a balance between speed and security.
Inovasi Sistem Kontrol Akses Gerbang Kantor Pemerintahan Berbasis Teknologi Multisensor dan Deteksi Plat Nomor Kendaraan Masril, Mardhiah; Ondra Eka Putra; Hasri Awal; Billy Hendrik
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 2 No. 2 (2024): Desember 2024
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v2i2.433

Abstract

Technological advances are developing rapidly at this time, the need for efficiency, security and automation in the office environment has become a top priority. One innovation that answers this need is technology for office gates, the need for a more sophisticated and efficient access control system is increasingly urgent. The problem that occurs, namely intrusions outside working hours, means that unknown individuals can easily enter the office area without permission. Additionally, cases involving lost employee ID cards, which were used by others to access designated areas, underscore the need for identification systems that are more secure and difficult to abuse. The office gate security system utilizes Webcam Camera input, RFID Reader, Fingerprint Sensor, Ultrasonic and Esp8266, Web, Servo, LED, LCD and Buzzer output. The Webcam camera can take pictures and save them on the web and the RFID Reader detects E-KTP, the Fingerprint sensor detects fingerprints and then the LCD displays information that registration is successful. This tool is processed with an Arduino Mega 2560 microcontroller as a connection.
Pengembangan Kontrol Robot Omnidirectional Menggunakan Sensor Gerakan Mpu 6050 Berbasis Internet Of Things (IoT) Aryo Pratama, Bimo; Deosa Putra Caniago; M. Abrar Masril; Luki Hernando; Muhammad Jufri
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 3 No. 1 (2025): Juni 2025
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v3i1.395

Abstract

Robotics is a field that encompasses interdisciplinary sciences, ranging from the mechanics of robot construction, electronics, and control systems to artificial intelligence. Initially, robotics was widespread in industry, often referred to as industrial robots. The Mini Trolley Robot provides a solution to issues related to flexibility in the room. The robot’s operation can be directed using motion sensors. This research aims to develop a controlled exploration system with an IoT-based mobile robot using the MPU6050 motion sensor. This aims to provide a solution to flexibility issues in complex environments without using traditional remote controls. The system uses the ESP32Wroom as the microcontroller, ESP32 Cam for video streaming, a driver module as the driver, DC motors, and a 12V to 5V converter. The ESP32 module allows good connectivity and remote control via a Wi-Fi network. The MPU6050 motion sensor can read tilt angles based on sensor data contained in the MPU6050 module. To access this sensor module, the I2C data line is used. This research employs the waterfall method, which includes stages of determining user requirements, followed by planning, modeling, construction, system delivery to users, and supporting the entire developed software. The motion sensor from the MPU6050 achieves a considerable range from 5 to 15 meters with accurate results, while reaching 19 meters results in a delay of 2 or 3 seconds.
Analisis Terhadap Keamanan Password Menggunakan Hash SHA-256 Hutasoit, Yen Rylin; Simangunsong, Vivaldi; Siallagan, Desrico
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 3 No. 1 (2025): Juni 2025
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v3i1.431

Abstract

Di era digital saat ini, keamanan kata sandi merupakan salah satu elemen penting dalam melindungi data pengguna dari berbagai ancaman. Penelitian ini berfokus pada analisis algoritma hash SHA-256, yang dikenal luas karena kemampuannya menghasilkan nilai hash yang unik dan sulit ditebak. Dengan menggunakan simulasi beberapa pola kata sandi, penelitian ini mengevaluasi efektivitas algoritma tersebut dalam menghadapi serangan seperti brute force dan rainbow table. Hasil penelitian menunjukkan bahwa SHA-256 cukup andal untuk melindungi kata sandi dari serangan berbasis kolisi. Namun, kemampuan perangkat keras modern untuk mencoba miliaran kombinasi per detik menjadikan panjang dan kompleksitas kata sandi faktor utama dalam memperlambat upaya serangan. Studi ini memberikan gambaran tentang keunggulan dan keterbatasan SHA-256 dalam pengamanan sistem berbasis kata sandi. Diharapkan, penelitian ini dapat membantu pengembang memahami penerapan algoritma ini dalam membangun sistem keamanan yang lebih baik
Metode Steganografi EOF untuk Penyisipan Pesan Teks Tersembunyi Malau, Mega; Hutahaean, Sarah; Siboro, Gilberd
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 3 No. 1 (2025): Juni 2025
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v3i1.434

Abstract

The transmission of information has become an essential aspect of human life in the modern technological era. Innovations continue to be developed to simplify and accelerate data exchange processes. However, threats to information security, such as data theft, sabotage, and unauthorized access, have also increased significantly. Therefore, innovative solutions are needed to protect information, especially confidential data involving two parties who wish to maintain its secrecy. In this context, research on steganography has become highly relevant. This study employs the End Of File (EOF) steganography technique, which enables embedding secret messages at the end of digital image files. This technique is chosen for its ability to conceal data without significantly altering the main structure of the image file. The embedding process is carried out meticulously so that the final product, known as the stego image, resembles an ordinary image file without any noticeable signs of modification. The primary advantage of the EOF technique lies in its efficiency in embedding and retrieving secret messages, making it a suitable solution for secure message transmission. The findings indicate that stego images produced using the EOF technique not only preserve the integrity of the original image but also enable quick and easy retrieval of messages by authorized recipients. This makes the technique an effective method to prevent data theft or sabotage during transmission. Amid the growing threats of cybercrime, EOF steganography offers an innovative solution to ensure information security while maintaining message confidentiality. Thus, it serves as a promising alternative for advancing future information security technologies.
Implementasi Keamanan Perangkat Lunak Menggunakan Algoritma Kriptografi dan Steganografi berbasis Web Telaumbanua, Emalia Putri; Rivael Sagala; Alvina Siallagan
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 3 No. 1 (2025): Juni 2025
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v3i1.445

Abstract

Software security has become very important in today's digital era, especially in protecting sensitive data that is often the target of cyber attacks. This research proposes a combination of Advanced Encryption Standard (AES) cryptographic algorithm and Least Significant Bit (LSB) steganography to enhance data security. By encrypting data using AES and hiding it in an image through the LSB method, this system not only protects the content of the data but also reduces the possibility of detection by third parties. The research method includes literature analysis, system prototype development, and testing to evaluate the effectiveness of the implementation. The test results show that the number of message characters has a significant effect on the image size after encoding and execution time. The more characters inserted, the image size increases proportionally, and the execution time for encryption and encoding also increases. This research is expected to contribute to the development of information security technology and practical solutions for software developers in improving application security.
Pemanfaatan K-Means Untuk Klasifikasi Citra Toge dan Jamur Enoki Berdasarkan Fitur Bentuk Dan Tekstur Devi Maryuni; Agung Ramadhanu
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 3 No. 1 (2025): Juni 2025
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v3i1.610

Abstract

The Purpose of this study is to explore the application of the K-Means algorithm in the process of classification of toge and enoki mushroom images, focusing on the separation of objects based on visual characteristics extracted from the image of toge and enoki mushroom is a food ingredient that is often found in foods in Asia, although it has almost similar shapes, but bean beetroot and enoki mushroom belong to different families. where toge belongs to the Marasmiaceae family and enoki mushrooms belong to the Marasmiaceae family. The image classification process begins with taking pictures of toge and enoki mushrooms which are then analyzed to extract the features of shape and texture from the image. Shape features are obtained through calculations such as the object's area, perimeter, and width ratio, while texture features are calculated using the Gray Level Co-occurrence Matrix (GLCM) approach to obtain information on contrast, energy, and homogeneity. Furthermore, the K-Means algorithm is used to group images based on the similarity of the features generated. The results of the study show that the use of shape and texture features with the K-Means Clustering and GLCM algorithms can produce a good and effective classification in distinguishing bean sprouts and enoki mushrooms.
Perbandingan Algoritma Kriptografi Hash Sha 256 dan Sha 512 Untuk keamanan sandi Toras, Toras Pangidoan Batubara; Mhd Adi Setiawan Aritonang
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 3 No. 1 (2025): Juni 2025
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v3i1.627

Abstract

Hash algorithms are still in great demand for use in data security but there are still many things that need to be tested Time and security of the hash algorithm. the author has tested the hash-256 algorithm and the hash-512 algorithm from testing both hash algorithms found a very unique comparison, namely the results of the hash-256 algorithm encryption of numeric characters are superior to the results of the hash-512 algorithm encryption for numeric characters when the original plaintext is returned. the conclusion is that the encryption of numeric characters from the hash-256 algorithm is safer to use than the results of the hash-512 algorithm encryption..

Page 3 of 4 | Total Record : 31