cover
Contact Name
Dirja Nur Ilham
Contact Email
dirja.poltas@gmail.com
Phone
+6285261233288
Journal Mail Official
dirja.poltas@gmail.com
Editorial Address
Kampus Politeknik Aceh Selatan, Jl. Merdeka Komplek Reklamasi Pantai
Location
Kota banda aceh,
Aceh
INDONESIA
JIKUM: Jurnal Ilmu Komputer
ISSN : -     EISSN : 3090739X     DOI : https://doi.org/10.62671/jikum.v1i2
Core Subject : Science,
JIKUM: Jurnal Ilmu Komputer menerbitkan artikel dalam Bahasa Indonesia yang akan diterbitkan 2 kali setahun yaitu periode Mei dan Nopember. Penulis yang mengirimkan naskah pada JIKUM: Jurnal Ilmu Komputer harus mengikuti pedoman penulisan, fokus dan ruang lingkup jurnal, serta template jurnal. Apabila naskah yang dikirim tidak sesuai dengan ketentuan tersebut, maka artikel akan ditolak.
Articles 10 Documents
Implementasi Fungsi Hash dalam Kriptografi Modern untuk Enkripsi Data Satu Arah Winanda, Mirza; Defrianti, Serli; Nabila, Wulan; Rikarni, Rikarni; Alfarizhi, Habieb
JIKUM: Jurnal Ilmu Komputer Vol. 1 No. 1 (2025): JIKUM: Jurnal Ilmu Komputer, Mei 2025
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v1i1.34

Abstract

Cryptography is the science and art used to maintain data privacy. In its development, modern cryptographicalgorithms work by processing data in the form of a series of bits. One important approach in cryptography is the useof a one-way hash function (one-way hash function), which is able to change data into a fixed representation thatcannot be returned to its original form.This paper discusses the implementation of hash functions in modern cryptography for the one-way encryptionprocess. The hashing application is developed using the Python programming language with the hashlib library and aTkinter-based GUI interface. This application allows users to enter text, select a hash algorithm such as MD5, SHA1, SHA-256, SHA-512, and HSE, and get the hash results directly. Tests were carried out on several algorithms totrigger differences in the length and complexity of the results.The main characteristic of a one-way hash function is that two different messages will always produce different hashvalues. The test results show that each algorithm produces a unique hash value for a given input, with varying lengthsdepending on the algorithm used. SHA-512 produces the longest hash and is considered the most secure among otheralgorithms.
Implementasi Asimetris Kuantum dalam Kriptografi Modern untuk Enkripsi Data Satu Arah Muzafi, Raihan; Abdillah, Arif; Marziah, Ainul; Rizky, Shaffanisa Aulia; Prizayanto, Abdi; Nurhiqmah, Aisyah
JIKUM: Jurnal Ilmu Komputer Vol. 1 No. 2 (2025): JIKUM: Jurnal Ilmu Komputer, Nopember 2025
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v1i2.35

Abstract

In a company, data security is very important. Data security and integrity issues must be considered to prevent information from falling into the hands of unauthorized persons. Therefore, a good mechanism is needed to secure data, which can be done through various cryptographic methods, which are generally divided into two categories: symmetric and asymmetric. Currently, the development of quantum computing shows extraordinary potential, especially in the field of cryptography. The phenomenon of quantum supremacy, where quantum computers can solve problems that cannot be solved by classical computers, is increasingly being felt. This raises uncertainty in the existing data security system, because various cryptographic algorithms and protocols are predicted to be quickly solved by sufficiently powerful quantum computers. To overcome this potential insecurity, the field of cryptography must adapt, one of which is through the concept of quantum key distribution which offers a new standard in secure communication. In symmetric key cryptography, a secure communication channel is required for key delivery, and the concept of quantum key distribution is a promising alternative to overcome this problem. This study aims to explore the implementation of quantum asymmetric cryptography in one-way data encryption, as well as assess its effectiveness in improving information security.
Pengembangan Aplikasi Kriptografi Modern Menggunakan Algoritma Simetris DES Berbasis Python Khairani, Lisda; Jasmiati, Jasmiati; Siregar, Putri Hasanah; Berutu, Putri Kenangan Br; Manurung , Andhika Saputra; Samosir, Alif Saka Al Bani
JIKUM: Jurnal Ilmu Komputer Vol. 1 No. 1 (2025): JIKUM: Jurnal Ilmu Komputer, Mei 2025
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v1i1.36

Abstract

In the current digital era, the security of information has become a fundamental aspect of system development. Cryptography, especially symmetric key algorithms, plays a key role in protecting data confidentiality. This research presents the development of a modern cryptographic application based on the Data Encryption Standard (DES), implemented using the Python programming language. The system is equipped with a graphical user interface (GUI) developed using Tkinter, allowing users to easily encrypt and decrypt text data. In addition to DES, the application also includes educational features such as RSA encryption and SHA-256 hashing to enhance users' understanding of various cryptographic techniques. The development process follows a prototyping method, from initial analysis to implementation and testing. Several functional tests were conducted using various text inputs, and results showed that the application successfully performed accurate encryption and decryption. Furthermore, the GUI interface provides an intuitive user experience, making it suitable as a learning tool in educational environments. This research contributes to the field of computer security by offering an open, accessible tool for understanding classical encryption methods and promoting awareness of basic data protection strategies in software applications.
Implementasi Sistem Keamanan Data Menggunakan Algoritma Kriptografi Asimetris Elliptic Curve Cryptography (ECC) Berbasis Website Iqlima, Putri; Rayyan, Muhammad; Rambe, Az Zahra Alfansuri; Ardina, Elin; Lubis, Delia Fitri Anggriani; Ismawati, Dea
JIKUM: Jurnal Ilmu Komputer Vol. 1 No. 1 (2025): JIKUM: Jurnal Ilmu Komputer, Mei 2025
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v1i1.37

Abstract

Data security is very important in the digital world, especially to protect personal data, financial transactions, and sensitive communications. One method used to maintain information security is cryptography, specifically Elliptic Curve Cryptography (ECC). ECC offers a level of security equivalent to other algorithms such as RSA, but with a smaller key size, making it more efficient in resource usage. This web-based system allows users to encrypt and decrypt messages using public and private keys. Although effective in maintaining data security, this system still requires manual input of keys by the user, which is prone to errors. Further development is needed to improve key management and user convenience. 
Implementasi Algoritma Advanced Encryption Standard (AES) Secara Manual Menggunakan Python Yusri, Farhan; Muttaqin, Agil; Syamil, Abdul Hafiz As; Luqman, Mahadika Nafis; Citra, Citra; Mursyid, Mursyid; Sidiq, M.Fajar; Siregar, Fathar Arsa
JIKUM: Jurnal Ilmu Komputer Vol. 1 No. 1 (2025): JIKUM: Jurnal Ilmu Komputer, Mei 2025
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v1i1.38

Abstract

Algoritma Advanced Encryption Standard (AES) merupakan salah satu algoritma kriptografi simetris yang paling banyak digunakan dalam menjaga kerahasiaan data digital. Penelitian ini bertujuan untuk memahami struktur dan cara kerja internal algoritma AES melalui implementasi manual menggunakan bahasa pemrograman Python. Proses enkripsi dilakukan secara bertahap, mencakup tahapan utama AES: SubBytes, ShiftRows, MixColumns, AddRoundKey, dan Key Expansion. Setiap tahapan direalisasikan dalam bentuk fungsi Python dan diuji menggunakan data input yang direpresentasikan dalam bentuk matriks. Hasil implementasi menunjukkan bahwa proses enkripsi berhasil membentuk blok cipher melalui transformasi bertahap sesuai dengan standar algoritma AES. Penelitian ini memberikan pemahaman yang lebih dalam mengenai konsep-konsep kriptografi modern serta pentingnya enkripsi dalam perlindungan data.
Implementasi Algoritma Asimetris DSA (Digital Signature Algorithm) dalam Aplikasi Sederhana untuk Tanda Tangan Digital Fitri, Aulia; Abdullah, Izza; Ramada, Tegar; Saputri, Rosita; Saharani, Juwita; Gultom, M. Frizki
JIKUM: Jurnal Ilmu Komputer Vol. 1 No. 1 (2025): JIKUM: Jurnal Ilmu Komputer, Mei 2025
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v1i1.39

Abstract

Seiring meningkatnya kebutuhan akan keamanan informasi di era digital, tanda tangan digital menjadi solusi penting dalam menjamin keaslian dan integritas data. Penelitian ini bertujuan untuk mengimplementasikan algoritma Digital Signature Algorithm (DSA) dalam bentuk aplikasi sederhana berbasis Python. Dengan pendekatan eksperimen terapan dan metode prototyping, aplikasi ini dikembangkan menggunakan pustaka kriptografi seperti PyCryptodome, hashlib, dan Tkinter. Aplikasi yang dihasilkan memungkinkan proses penandatanganan dan verifikasi pesan secara efisien. Hasil implementasi menunjukkan bahwa sistem mampu mendeteksi setiap perubahan pada pesan dan menjamin validitasnya, meskipun masih terdapat keterbatasan pada format pesan yang didukung dan ketergantungan terhadap file kunci eksternal. Penelitian ini memberikan pemahaman praktis tentang penerapan kriptografi asimetris dalam pengamanan data digital.
Pengembangan Aplikasi Kriptografi RSA dan SHA-256 Berbasis Web Menggunakan Flask Tarigan, Nur Azila; Anggreni, Anastasya Cut Nabila; Balqis, Alfia; Nurfadilah, Indah; Bakti, Eri Setia; Mahyudin, Fadli
JIKUM: Jurnal Ilmu Komputer Vol. 1 No. 2 (2025): JIKUM: Jurnal Ilmu Komputer, Nopember 2025
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v1i2.40

Abstract

In today's digital era, data security has become a crucial issue due to the increasing volume of information exchanged over the internet. One of the main approaches to protecting data is through the use of cryptographic techniques. This research presents the development of a modern cryptographic application based on web technology, implementing the RSA (Rivest-Shamir-Adleman) algorithm for encryption and decryption processes, as well as the SHA-256 (Secure Hash Algorithm) for generating hash values to verify data integrity. The application is built using the Flask framework and Python programming language, complemented by a responsive interface developed with Bootstrap. Features include the ability to encrypt and decrypt messages, generate hash values, and download keys and processing results in text file formats. The development methodology follows a prototyping approach, with a series of functional tests conducted to ensure encryption accuracy, hashing consistency, and file export reliability. The results show that the application successfully performs all features and provides an intuitive and efficient user experience in understanding basic cryptographic concepts.
Implementasi Sistem Keamanan Data Menggunakan Algoritma Kriptografi Simetri IDEA Azzahwa, Siti Ikhlisa; Maulida, Elvira; Oktavia, Putri Naila; Fahrezi , Irgi Ahmad; Mahtuah, Musyawirdi; Dania, Khildania
JIKUM: Jurnal Ilmu Komputer Vol. 1 No. 2 (2025): JIKUM: Jurnal Ilmu Komputer, Nopember 2025
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v1i2.44

Abstract

Banyak algoritma kriptografi modern yang walaupun menyediakan keamanan tinggi,Namun sangat susah dimengerti dan dipelajari masyarakat awam. Tujuan dari penelitian ini adalah untuk membangun suatu perangkat lunak yang tidak hanya bisa menjaga keamanan data dengan kuat dan andal, tapi juga mudah dimengerti banyak orang.Untuk itulah algoritma IDEA dipilih, karena algoritma ini termasuk algoritma yang memuaskan user selain dengan kekuatan dan keandalannya dari berbagai serangan para kriptanalis, juga dengan kemudahannya dipelajari semua orang. Sistem ini dikembangkan menggunakan bahasa pemrograman C++. Analisis kebutuhan perangkat lunak algoritma IDEA dilakukan dengan menentukan nama perangkat lunak yang akan dibangun, mengetahui siapa yang akan menggunakan perangkat lunak tersebut, memahami konsep teknologi yang akan dipakai, membuat tampilan antarmuka yang mendidik, menentukan teknik yang dipergunakan untuk membentuknya, serta menguji hasil perangkat lunak tersebut. Objektif utama sistem ini adalah untuk melihat dan mempelajari berbagai konsep dan prinsip untuk merancang dan mengimplementasikan sistem keamanan data menggunakan algoritma IDEA.
Implementasi Algoritma AES Sebagai Kriptografi Simetris Untuk Proses Enkripsi Dan Dekripsi Data Juandana, Rio Adian; Harahap, Atika Prawiti; Hutabarat, Zuraidah Putri Br.; Matondang, Anggi Dwi Mentari; Maulida, Ulfia; Nasywa, Muhammad Athaya
JIKUM: Jurnal Ilmu Komputer Vol. 1 No. 2 (2025): JIKUM: Jurnal Ilmu Komputer, Nopember 2025
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v1i2.45

Abstract

Cryptography is one method used to transform data into a form that cannot be read without a special key. One of the most widely used symmetric cryptographic algorithms is the Advanced Encryption Standard (AES). AES was developed to replace DES with advantages in its complex yet efficient algorithm structure. This study aims to examine the structure and implementation of the AES algorithm in the process of data encryption and decryption. The method used is literature review and simple implementation using Python programming language. The results show that encryption and decryption processes can be performed consistently and accurately using a symmetric key, in accordance with AES principles.
Penggunaan metode SAW dalam pendukung Keputusan pemilihan pegawai terbaik di MTs Nurul Huda Sukaraja Ulum, Miftahul; Setiawan, Rico; Apriani, Fitri; Firdaus, Thoha
JIKUM: Jurnal Ilmu Komputer Vol. 1 No. 2 (2025): JIKUM: Jurnal Ilmu Komputer, Nopember 2025
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v1i2.74

Abstract

The selection of the best employee at MTs Nurul Huda Sukaraja was previously conducted subjectively through teacher voting without a measurable evaluation system. This study aims to implement the Simple Additive Weighting (SAW) method in a decision support system to enhance objectivity and accuracy in assessing employee performance. The method involves assigning weights to criteria such as attendance, discipline, work ethic, and communication, followed by normalization and ranking based on the final scores of each employee. Data were collected through observation, literature review, and interviews. The results showed that the employee named Ariyanto achieved the highest score (2.7061) and was designated as the best employee. The implementation of the SAW method proved effective in facilitating a more fair, systematic, and transparent selection process, supporting human resource management in the school environment.

Page 1 of 1 | Total Record : 10