cover
Contact Name
Tito Sugiharto
Contact Email
tito@uniku.ac.id
Phone
+6281221969608
Journal Mail Official
buffer.informatika@uniku.ac.id
Editorial Address
Kampus 2 Universitas Kuningan Fakultas Ilmu Komputer, Prodi Teknik Informatika, Jalan Pramuka No. 67. Kecamatan Kuningan, Kabupaten Kuningan, Provinsi Jawa Barat 45513
Location
Kab. kuningan,
Jawa barat
INDONESIA
Buffer Informatika
Published by Universitas Kuningan
ISSN : 25274856     EISSN : 26145413     DOI : https://doi.org/10.25134/buffer.v5i2
Core Subject : Science,
BUFFER INFORMATIKA is an official scientific journal published and managed by Department of Informatics Engineering, Faculty of Computer Science, University of Kuningan, Indonesia. Buffer Informatika is a peer-reviewed journal on Software Engineering covering all branches of IT and sub-disciplines including: Algorithms Computer Networks Games Software Engineering Mobile Applications Artificial Intelligence Image Processing Computer Graphics Robotics Data Mining and other Information Technology.
Articles 12 Documents
Search results for , issue "Vol. 12 No. 1 (2026): Buffer Informatika" : 12 Documents clear
Pengembangan Sistem Informasi MBKM Terintegrasi Berbasis Prototyping Berorientasi Pengguna Nunu Nugraha; Toto Supartono
Buffer Informatika Vol. 12 No. 1 (2026): Buffer Informatika
Publisher : Department of Informatics Engineering, Faculty of Computer Science, University of Kuningan, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/buffer.v12i1.574

Abstract

The Merdeka Belajar Kampus Merdeka (MBKM) policy requires higher education institutions to manage student learning activities in an integrated and efficient manner. However, MBKM data management still faces several challenges, including unintegrated administrative processes, delayed document verification, and limited access to course recognition information. These issues reduce efficiency and hinder effective academic management. This study aims to develop an integrated MBKM student data management information system based on user needs. This study employs a prototyping approach that enables iterative system development through continuous user involvement, from requirement analysis to system evaluation. Data were collected through questionnaires involving 1,645 respondents and supported by interviews to identify system requirements. The results show that the developed system successfully integrates MBKM management processes, including program data, document management, student activities, and reporting within a web-based platform. Functional testing using black-box testing achieved a 100% success rate, while User Acceptance Testing (UAT) yielded an average score of 87.6%, indicating a very good level of user acceptance. This study contributes by proposing a user-centered prototyping-based model for developing integrated MBKM information systems, which enhances data management effectiveness in higher education institutions. The findings indicate that the proposed system is feasible for real-world implementation in higher education environments.
IMPLEMENTASI ALGORITMA TIGER HASH SEBAGAI PENGAMANAN APPLICATION PROGRAMMING INTERFACE PADA KOMUNIKASI DATA BERBASIS WEB SERVICES Lesmana, Iwan Lesmana; Aah Sumiah; Nugraha, Fitra
Buffer Informatika Vol. 12 No. 1 (2026): Buffer Informatika
Publisher : Department of Informatics Engineering, Faculty of Computer Science, University of Kuningan, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/buffer.v12i1.576

Abstract

Web Services merupakan suatu sistem perangkat lunak yang menyediakan antarmuka untuk mengakses sekumpulan data maupun layanan yang tersimpan dalam basis data melalui jaringan internet. Pada kondisi standarnya, web services tidak dilengkapi dengan mekanisme keamanan yang memadai untuk melindungi akses data. Meskipun sebagian implementasi web services telah menggunakan JSON Web Token (JWT) sebagai lapisan keamanan autentikasi dengan algoritma HS256 berbasis SHA256, algoritma tersebut diketahui memiliki celah keamanan berupa serangan Preimage Attack dalam Pseudo Collision yang dapat mengancam integritas data. Serangan Preimage menargetkan fungsi hash kriptografi dengan tujuan menemukan pesan yang menghasilkan nilai hash tertentu, sehingga kerahasiaan token dapat terancam. Untuk mengatasi kelemahan tersebut, diperlukan penerapan algoritma hash yang lebih kuat sebagai pengganti SHA256 pada JWT. Algoritma Tiger Hash dipilih sebagai solusi karena mampu memproses pesan dalam blok berukuran 512 bit dan menghasilkan message digest berukuran 192 bit. Tiger Hash bekerja melalui 24 putaran yang terbagi dalam tiga pass, masing-masing terdiri dari delapan putaran dalam, dengan memanfaatkan operasi XOR, penambahan atau pengurangan, rotasi, serta pencarian S-boxes. Hasil akhir penelitian ini adalah sebuah web services yang mengintegrasikan algoritma Tiger Hash sebagai mekanisme pengamanan komunikasi data.

Page 2 of 2 | Total Record : 12