Claim Missing Document
Check
Articles

Found 15 Documents
Search

Evolusi Cipher Vigenere dalam Peningkatan Pengamanan Informasi Eka Ardhianto; Widiyanto Tri Handoko; Edy Supriyanto; Hari Murti
Jurnal Informatika Upgris Vol 7, No 2: Desember 2021
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/jiu.v7i2.9333

Abstract

Pertukaran informasi melalui ruang publik masih menyisakan kerentanan keamanan, sehingga perlu mekanisme pengamanan melalui proses kriptografi. Salah satu model kriptografi yang dapat bertahan hingga lebih dari 300 tahun adalah Vigenere Cipher, sebelum dipecahkan oleh Kasiski dan Friedman. Artikel ini membahas tentang perkembangan dan evlolusi Vigenere Cipher. Hingga saat ini, penggunaan Vigenere Cipher masih dapat diaplikasikan untuk mengamankan petukaran informasi dan transaksi komunikasi. Dalam perkembangannya, bentuk evolusi pada Vigenere terfokus pada tiga bagian, pengembangan dengan metode hibrid, pengembangan pada proses penerbitan kunci yang digunakan dan pengembangan pada jumlah karakter set yang digunakan pada Vigenere. Dengan pengembangan pada ketiga fokus tersebut, maka Vigenere Cipher mampu menyuguhkan tingkat keamanan yang lebih baik pada informasi yang disandikannya. Keuntungan lain adalah Vigenere Cipher dengan pengembangan ini dapat diaplikasikan dan diterima untuk pengamanan dan pertukaran infomasi pada bidang yang lebih luas
PEMANFAATAN GOOGLE MAP API GUNA OPTIMALISASI IDENTIFIKASI ASET PEMERINTAH KOTA SEMARANG DENGAN METODE PASSING MULTIPLE PARAMETERS Endang Lestariningsih; eka ardhianto; W. T. Handoko; Edy Supriyanto
Jurnal Informatika Upgris Vol 4, No 2: Desember (2018)
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/jiu.v4i2.2666

Abstract

The Law on Regional Autonomy has the impact of the Regional Government having the authority to manage the assets and regional income independently. Semarang City is an area in the Central Java Province managed by the local government of Semarang city that is required to be able to carry out autonomy well. One of the things done is the management of land and building assets owned by Semarang city government that functioned for the public interest and the implementation of city government semarang. data of government assets owned by Semarang city government recorded in Identity Card belonging to the Regional Finance and Asset Management Agency (DPKAD) there are 3,092 plots of asset managed by Regional Secretariat, Institution under Semarang City Government and management by sub-district and kelurahan area.Land assets managed by the municipal government of Semarang are currently not considered optimal. The application of the management information system for the location of the city government's land assets is planned to use the Google Maps Application Programming Interface (API), can be viewed as a solution to help the implementing officer recognize the location of the asset land and provide competitive advantages and advantages in an effort to transparency of the city government semarang on assets owned and the achievement of Semarang city to semarang be smart city.With the support of management information system application of land asset location of Semarang city government which can represent referring to location of location of real asset with remote sensing (sensing) is expected to be used effectively to manage, control and control the land asset.
Peningkatan Ketahanan Algoritma Vigenere menggunakan Generator kunci Tiga Lapis Edy Supriyanto; Widiyanto Tri Handoko; Sutrasno Andre Wibowo*; Eka Ardhianto
JURNAL MAHAJANA INFORMASI Vol 7 No 1 (2022): JURNAL MAHAJANA INFORMASI
Publisher : Universitas Sari Mutiara Indonesia Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51544/jurnal mi.v7i1.2894

Abstract

Vigenere merupakan algoritma enkripsi berbasis teks yang sederhana. Dalam kriptografi, vigenere telah mengalami banyak modifikasi untuk memperkuat kerahasiaan informasi dari pihak yang tidak berhak. Faktor penting yang mempengaruhi ialah penggunaan kunci. Penelitian ini bertujuan untuk memperkuat ketahanan informasi yang diamankan vigenere melalui proses penerbitan kunci. Eksperimen ini mengusulkan penggunaan Teknik penerbitan kunci secara berlapis. Fungsi random, penggunaan bilangan euler dan metode penerbitan kunci Blum Blum Shub dieksperimenkan pada model enkripsi “extended Vigenere”. Sebagai metrik performasi digunakan perhitungan nilai entropi. Eksperimen ini mendapatkan hasil berupa penggunaan penerbitan kunci secara berlapis pada model enkripsi “extended Vigenere” meningkatkan nilai entropi informasi rahasia yang berimbas pada peningkatan ketahanan informasi dari serangan kriptanalis.
Peranan Fuzzy dalam Pengamanan Informasi Eka Ardhianto; Hari Murti; Endang Lestariningsih; Rara Sriartati Redjeki; Edy Supriyanto
Jurnal Informatika dan Rekayasa Perangkat Lunak Vol 4, No 1 (2022): Maret
Publisher : Universitas Wahid Hasyim

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36499/jinrpl.v4i1.5215

Abstract

Pengamaman informasi sudah menjadi hal yang wajib dalam era revolusi teknologi informasi. Penggunaan internet dalam perangkan cerdas dan multiplatform akan menjadi celah bagi kriptanalis untuk mencurangi informasi. Kriptografi adalah salah satu teknik pengamanan informasi yang hingga saat ini memiliki banyak metode didalamnya. Meskipun demikian, informasi yang sandikan akan tetap memiliki celah kelemahan. Penggabungan teknik kriptogarfi dengan metode fuzzy banyak diusulkan dalam rangka peningkatan kualitas informsi yang disandikan. Dengan melakukan penelusuran sistematis literatur, ditemukan beberapa artikel yang mulai menggabungkan kriptografi dan fuzzy. Penelusiran ini bertujuan untuk melihat bagaimana peranan fuzzy dalam bidang kriptografi. Hasil yang diperoleh adalah adanya peningkatan kualitas bentuk pengamanan informsi yang dipadukan dengan fuzzy melalui beberapa cara. Selain itu, penggunaan fuzzy juga tidak terbatas dalam peningkatan keamanan. Fuzzy juga berperan dalam pemilihan kunci dan password terbaik serta penerbitan angka acak dari sebuah PRNG.
Klasifikasi Opini Pengguna Media Sosial Twitter Terhadap JNT Di Indonesia dengan Algoritma Decision Tree Widiyanto Tri Handoko; Edy Supriyanto; Dimas Indra Purwadi; Zuly Budiarso; Hersatoto Listiyono
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.490

Abstract

JNT Ekspress is one of the many freight forwarding companies that exist today, where JNT has very wide access so it is very easy to use for the public in shipping goods. With the current network, JNT is able to deliver goods to all provinces in Indonesia. With the large number of users, of course there will be a lot of user opinions that appear, both positive and negative opinions. In order to be able to categorize multiple opinions, a machine learning program is needed that can simplify the process of grouping the opinion. There are many algorithms that can be used to classify opinions, one of them is Decision Tree. Prior to grouping or classification, Tweet data that has been collected needs to be preprocessed first so that the tweet data can be recognized by the system. Based on this research, the Decision Tree algorithm gets an accuracy of 94.12% with a comparison ratio of training data and testing data of 90:10
Klasifikasi Opini Pengguna Media Sosial Twitter Terhadap JNT Di Indonesia dengan Algoritma Decision Tree Widiyanto Tri Handoko; Edy Supriyanto; Dimas Indra Purwadi; Zuly Budiarso; Hersatoto Listiyono
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.490

Abstract

JNT Ekspress is one of the many freight forwarding companies that exist today, where JNT has very wide access so it is very easy to use for the public in shipping goods. With the current network, JNT is able to deliver goods to all provinces in Indonesia. With the large number of users, of course there will be a lot of user opinions that appear, both positive and negative opinions. In order to be able to categorize multiple opinions, a machine learning program is needed that can simplify the process of grouping the opinion. There are many algorithms that can be used to classify opinions, one of them is Decision Tree. Prior to grouping or classification, Tweet data that has been collected needs to be preprocessed first so that the tweet data can be recognized by the system. Based on this research, the Decision Tree algorithm gets an accuracy of 94.12% with a comparison ratio of training data and testing data of 90:10
SISTEM INFORMASI PENJUALAN BERBASIS WEB PADA PT. PERWIRA Asa Febri Nur Fitriani; Edy Supriyanto
MEANS (Media Informasi Analisa dan Sistem) Volume 7 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Report recording system and product sales that have been carried out at PT. Officer is still manual by using the Microsoft Excel application which is done by the admin of PT. Officer which is considered very risky in data storage. In addition, if the customer comes directly to the store, the customer must wait at least 30 minutes for transaction processing because the admin is still processing it manually. With the creation of a Sales Information System at this Web-Based PT. Officer, it is hoped that it can help all parties to process the data. Data processing starts from the admin who can add products, edit products and delete products that are directly connected to the database. And customers can make product purchase transactions.This system was developed using Visual Studio Code, PHP, CSS, XAMP V3.3.0 and MYSQL applications. The method used or used in this information system is the Waterfall Method. With this website, transactions and sales reports can be processed in a structured manner and the security system can be guaranteed because it is stored in the database. This website is designed to assist customers in providing the desired product. The results of this information system can simplify the ordering process and the sales process. And this information system is also a means to expand and simplify services so that they can become faster, more effective and efficient.
Design of monitoring information system FTTH (fiber to the home) CV. Fastnet media web-based Wawan Septiana; Edy Supriyanto
Jurnal Mantik Vol. 6 No. 4 (2023): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Developments in making customer-oriented services (customer oriented) are numerous so that they are increasingly spoiling customers. Likewise with the very rapid development of the Start Up world in Indonesia, so that many large companies are interested in developing Start Ups under their supervision, such as CV Fasnet Media collaborating customer oriented and Start Up services. Collaboration is carried out such as in building a system to prevent interruptions in products and subscriptions.  In the course of the New interruption and subscription prevention system requires a website to monitor the operation of the system. CV Fasnet Media is still experiencing bandwidth management problems, therefore a special system is needed where workers can more easily manage data -data l to support the administration of activities that are effective, efficient and can provide easily accessible information facilities. In monitoring the website, it is intended for the responsible party (Team Leader) in monitoring activation by technicians who use a disturbance prevention system and new subscriptions. In monitoring the website also displays potential fault points around the area, then can manage data technicians and customers registered in the intrusion prevention system. This monitoring makes it easier for Team Leaders because they can manage technicians and see potential interference points visually provided on the web-based Monitoring System website.
Model Sistem Informasi Penyewaan Mobil Wibi Rent Car Berbasis Web Mobile Alifan Purnomo Aji; Edy Supriyanto
Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Vol 12, No 1: April 2023
Publisher : STMIK Banjarbaru

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35889/jutisi.v12i1.1029

Abstract

The car rental administration system that runs at Wibi Rent Car is not yet effective because it is still carried out using a manual recording system. This study aims to develop a Web-based information system model that can be used to assist business management in managing data collection, product promotion, and managing car rental activities as well as online management reporting. System development follows the general stages of the Prototype method. The system design uses object-oriented tools, while the implementation uses the PHP programming language with the Laravel framework and MySQL database. Functional features for car registration, tenant data, driver data, promotions and online rental transactions, as well as management reporting are validated using Blackbox Testing. The test results show that the functional features are running validly.Keywords: Car rental; Web-based system; Prototype Method; Laravel Framework; Blackbox testing AbstrakSistem administrasi penyewaan mobil yang berjalan di Wibi Rent Car belum efektif karena masih dilakukan menggunakan sistem pencatatan manual. Penelitian ini bertujuan untuk mengembangkan model sistem informasi berbasis Web yang dapat digunakan untuk membantu manajemen usaha dalam melakukan manajemen pendataan, promosi produk, dan mengelola aktivitas penyewaan mobil serta pelaporan manajemen secara online. Pengembangan sistem mengikuti tahapan-tahapan umum dalam metode Prototype. Desain sistem menggunakan tools berorientasi objek, sedangkan implementasi menggunakan bahasa pemrograman PHP dengan framework Laravel dan database mySQL. Fitur-fitur fungsional untuk pendataan mobil, pendataan penyewa, pendataan pengemudi, promosi dan transaksi penyewaan secara online, serta pelaporan manajemen divalidasi menggunakan Blackbox Testing. Hasil uji menunjukkan fitur-fitur fungsional telah berjalan secara valid.       
RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext Hari Murti; Edy Supriyanto; Rara Redjeki; Eka Ardhianto
Inspiration: Jurnal Teknologi Informasi dan Komunikasi Vol. 12 No. 2 (2022): Inspiration: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Pusat Penelitian dan Pengabdian Pada Masyarakat Sekolah Tinggi Manajemen Informatika dan Komputer AKBA Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (304.702 KB) | DOI: 10.35585/inspir.v12i2.1

Abstract

Steganography is the art and science of writing hidden messages or hiding messages in such a way that, apart from the sender and the recipient, no one knows or is aware that there is a secret message (it does not appear that there is a hidden message. Furthermore, public key cryptography is the type of cryptography that using two interrelated keys, namely the public and private keys. Cryptography and steganography techniques have an important role in securing information. Parallel Encryption with Digit Arithmetic of Covertext (PDAC) encryption model adopts cryptography and steganography for securing messages. The accuracy of the number of covertext in the PDAC affects whether the PDAC works. If the number of PDAC covertext does not match, then the encryption process will be imperfect. This study aims to close the PDAC gap. The proposed model adopts the repeated use of covertext. Covertext loops applied in PDAC can process information security. Another advantage obtained is that this modification makes it easier for users to use PDAC without having to meet the minimum covertext requirement.