cover
Contact Name
M. Miftach Fakhri
Contact Email
fakhri@diginus.id
Phone
+6282348761241
Journal Mail Official
fajarb@diginus.id
Editorial Address
Antang, Makassar, South Sulawesi, Indonesia
Location
Kota makassar,
Sulawesi selatan
INDONESIA
Journal of Progressive Information, Security, Computer and Embedded System
ISSN : 2986724X     EISSN : 29867258     DOI : https://doi.org/10.61255/pisces
Focus and Scope, PISCES scientific journal encompasses all aspects of the latest outstanding research and developments in the field of Computer science including: Artificial intelligence, Data science, Databases, Computer performance analysis, Computer security and cryptography, Computer networks, Parallel and distributed systems, Microcontroller, Internet of Things, Software engineering.
Articles 5 Documents
Search results for , issue "Vol. 1, No. 2 September (2023)" : 5 Documents clear
Improvement of Document Security Against Aes-192 Algorithm Based Trojan Attacks (Advanced Encryption Standard): Peningkatan Keamanan Dokumen Terhadap Serangan Trojan Berbasis Algoritma Aes-192 (Advanced Encryption Standard) Sunarti, Irmayana
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 2 September (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.96

Abstract

Document security is the protection of information contained in documents from threats and risks that may arise, both from physical attacks and cyber attacks, one of which is a trojan attack. An algorithm is a solution or method of document security that is appropriate for maintaining the confidentiality and authenticity of documents, and can improve the security aspects of a document or information. The algorithm used in enhancing document security to encrypt and decrypt documents is the AES-192bit algorithm (Advanced Encryption Standard). The method used is the waterfall method which consists of literature studies, system analysis, system design, implementation and testing. The resulting application is an AES encryption and decryption application using the web-based AES-192 algorithm method. This application is intended to secure documents in the following formats: .docx, .xls, .xlsx, .pdf and .text. The results of the study can be concluded that increasing data security using the AES-192 algorithm is successful. The encryption process is carried out to produce data that is not easy to read and not easily hacked by others unless they have the key to decrypt the data. The key used to encrypt and decrypt is the same. If the key used is the same then the data can be used, but if it is different then the result will not be read.
data security Enhancement of Private Message Security Using Classic Cryptography Based on Cipher Substitution Algorithms: Peningkatan Pengamanan Pesan Pribadi Menggunakan Kriptografi Klasik Berbasis Algoritma Subtitusi Chiper Idrus, Hildayanti
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 2 September (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.97

Abstract

In this growing digital age, message or information security is important because more and more information or messages are vulnerable to being accessed or read by unauthorized persons. To protect the privacy and confidentiality of personal information, an effective and reliable message security system is needed. One effective way is to use cryptographic algorithms such as the cipher substitution algorithm that has been used to secure data. Implementation of a message or information security system using a cipher substitution algorithm can be an effective and reliable solution for securing private messages from attacks and unauthorized access and maintaining the privacy and confidentiality of personal information. This study uses the method of Literature Study, System Analysis, Implementation, and Testing to analyze and implement a visual basic based cipher substitution algorithm. The result of this research is an application based on Microsoft Visual Basic that can encrypt and decrypt messages/texts. The cipher substitution algorithm shows that the encryption and decryption process can maintain the security of the message that has been tested so that message security is guaranteed and confidentiality is maintained.
Deteksi Serangan SQL Injection pada Website dengan Menggunakan Metode Reguler Expression: Deteksi Serangan SQL Injection pada Website dengan Menggunakan Metode Reguler Expression Supartini, Reni
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 2 September (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.101

Abstract

Along with current technological developments, security for data information residing on websites is very vulnerable to crimes in the internet world such as attacks on security holes in the database layer or often known as SQL Injection. SQL Injection attack is a method to insert SQL commands as input through an application in order to gain access to the database. This attack can find out usernames, passwords, and other data that is in the database. So that the SQL Injection attack is one of the most popular attacks and is often used to take advantage of security holes in the system because of how easy it is to use it. If the website database can be accessed, then a hacker can easily steal various confidential data, can even manipulate or damage data on the website. This article aims to test the effectiveness of SQL Injection attacks using the regular expression method. The results of research on effectiveness in SQL Injection are the accuracy of database search time and the accuracy of information from the database.
Pengembangan Sistem Otentikasi Dokumen Digital Jurusan Teknik Informatika Dan Komputer Fakultas Teknik UNM Berbasis Digital Signature Mahgafhira, Iin; Wahid, Abdul; Parenreng, Jumadi Mabe
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 2 September (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.151

Abstract

This study aims to determine the development of a digital document authentication system in the informatics and computer engineering department, Faculty of Engineering, UNM based on digital signatures and the results of testing software quality standards using ISO25010 by implementing 3 aspects, namely functional suitability, performance efficiency and portability. Maintain document authenticity using the MD5 algorithm as a Hash function to produce a message digest and the RSA algorithm as a public key algorithm. This research uses research and development (R&D) with a prototype design model. Testing using ISO25010 by implementing 3 aspects produces a system that is acceptable and feasible to use. As for the results of testing the RSA and MD5 algorithms, it was found that the results of this digital signature-based digital document authentication system can ensure the authenticity and integrity of documents so that they can prevent falsification and manipulation of documents by unauthorized persons.
Pengembangan Aplikasi E-Commerce Potensi Unggulan Desa untuk Masyarakat Pataro Berbasis Android Mabe Parenreng, Jumadi; S. Lamada, Mustari; Jusniar, Jusniar
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 2 September (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.158

Abstract

This research is a software development that aims to determine the results of testing, effectiveness, development of the E-Commerce application. maintenance, portability. The development model used is the waterfall with the stages of needs analysis, concept design, system coding, system testing, and program implementation, and uses Research and Development (R&D) research methods. Data collected using interview techniques, observation, questionnaires, documentation. The application was validated by two system experts and evaluated by 30 respondents. The data analysis technique used is quantitative descriptive analysis in the form of proportions. Research results obtained based on ISO 25010 testing: (1) suitability of the functionality of the test specifications is worth 1 and has fulfilled the Testing aspect; (2) testing the performance efficiency aspect using Android Studio software, Visual Studio Code with the acquisition of raster max 231.4 ms/frame and avg 26.7 ms/frame and UI max 85.1 ms/frame and avg 4.5 ms/ frame; (3) testing the compatibility aspects of several applications that are run simultaneously to obtain results that can run well; (4) testing the usability aspect to 30 respondents with a score of 90.17%, very good category; (5) testing the reliability aspect with the test results of 200 tests in the dropped statement, namely keys, pointers, trackballs, flips, and rotations worth 0; (6) testing the security aspects with a score (52/100); (7) aspects of maintability testing get notification results if there is an error; (8) testing aspects of portability on several types of smartphones with different Android versions can run well without any problems.

Page 1 of 1 | Total Record : 5