Claim Missing Document
Check
Articles

Found 13 Documents
Search

Komputasi Paralel Gpu Dengan Teknologi Nvdia Cuda Untuk Enkripsi Berkas Pdf Menggunakan Algoritma RC4 DAN MD5 farissi, Al; Hany, Samatra Marwa
Jurnal Sistem Informasi Vol 9, No 2 (2017): Oktober
Publisher : Major of Information Systems Faculty of Computer Science Sriwijaya University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract   One way to secure files on storage media is by cryptographic techniques.The content of PDF files sometimes Contains with important information. therefore information security becomes a priority at this time. In this research, PDF files will be encrypted with MD5-RC4 technique. This combination makes information more secure and protected from information disclosure. This research implement parallel computing using GPU and CPU  that make a performance of process run faster. When Nvidia released CUDA, GPU Become a strong power as an efficient accelerator for complex computations. Therefore, the GPU with CUDA and the comparision between CUDA and CPU will be discussed in this study. Keywords: PDF, Enkripsi,CUDA,MD5,RC4.   Abstrak Salah satu cara pengamanan berkas di dalam media penyimpanan yaitu dengan cara teknik kriptografi. Berkas PDF merupakan salah satu tipe berkas yang sering digunakan untuk menyimpan informasi. Oleh karena itu keamanan informasi menjadi prioritas saat ini. Dalam penelitian ini berkas PDF akan dienkripsi dengan teknik MD5-RC4. Kombinasi ini membuat informasi lebih aman dan terlindungi dari pencurian informasi. Selain itu, pada penelitian ini menerapkan komputasi paralel dengan menggunakan GPU dan CPU agar proses berjalan lebih cepat. GPU menjadi kekuatan yang kuat sebagai akselerator yang efisien untuk perhitungan kompleks. Oleh karena itu, GPU dengan CUDA serta perbandingan kecepataan antara CUDA dan CPU akan dibahas dalam penelitian ini. Kata kunci: PDF, Enkripsi,CUDA,MD5,RC4.
Steganografi pada Citra Digital Berwarna 32-Bit Menggunakan Least Significant Bit Ahmad Aidil Fitri; Megah Mulya; Al Farissi
Annual Research Seminar (ARS) Vol 2, No 1 (2016)
Publisher : Annual Research Seminar (ARS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penelitian steganografi menggunakan metode Least Significant Bit (LSB) pada citra sebagai media penampung pesan rahasia umumnya menggunakan citra 8-bit hingga 24-bit dimana penyisipan atau penyembunyian pesan dilakukan di bit-bit kurang berarti elemen abu-abu untuk citra grayscale dan elemen merah, hijau dan biru (RGB) untuk citra berwarna. Pada penelitian ini citra penampung yang digunakan merupakan citra digital berwarna dengan kedalaman bit berjumlah 32 berekstensi *.png dan pesan rahasia berupa berkas teks berekstensi *.txt. Teknik penyisipan LSB pada penelitian ini mengalami peningkatan karena citra digital yang digunakan yaitu 32-bit dimana memiliki 4 elemen warna yaitu merah, hijau, biru dan alfa (RGBA). Hasil yang diperoleh dari penelitian ini menghasilkan daya tampung atau kapasitas pesan rahasia yang dapat disisipkan lebih besar dan tetap menghasilkan kualitas citra stego yang baik dengan nilai Mean Square Error kurang dari 2.0 dan nilai Peak Signal-to-Noise Ratio diatas 40dB.
Algoritma RSA Kombinasi dan Skema QR Code untuk Mengamankan Data Penjualan Tiket Online Al Farissi; Kanda Januar Miraswan; Redo Jufarda; Muhammad Fachrurrozi; Anna Dwi Marjusalinah
Annual Research Seminar (ARS) Vol 3, No 1 (2017): ARS 2017
Publisher : Annual Research Seminar (ARS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Kriptografi adalah bidang ilmu komputer untuk menjaga keamanan data dan informasi. Salah satu penerapan kriptografi adalah mengamankan data penjualan tiket elektronik pada penjualan online tiket pertandingan sepak bola. Pada penelitian ini, penulis menerapkan skema pengamanan data penjualan dengan metode pengamanan menggabungkan algoritma RSA dan QR Code. Selanjutnya, algoritma RSA yang digunakan akan mengubah data tiket teks polos asli (plaintext) ke dalam bentuk lain yang tidak dapat dipahami (ciphertext). Data pembelian yang telah di enkripsi akan dikonversi menjadi QR Code. Kode ini digunakan oleh pembeli untuk memverifikasi data sebelum memasuki stadion. Dari hasil pengujian dengan perangkat lunak menunjukkan bahwa algoritma RSA dan QR Code dapat diterapkan pada keamanan data tiket
Pelatihan Membuat dan Mengelola Web Blog sebagai Media Pembelajaran yang Efektif untuk Guru-guru SMP Se-Kecamatan Tanjung Batu Ogan Ilir Megah Mulya; Al Farissi; Osvari Arsalan
Annual Research Seminar (ARS) Vol 2, No 2 (2016): Special Issue : Penelitian, Pengabdian Masyarakat
Publisher : Annual Research Seminar (ARS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper contains the reports of training activities to create and manage web blog as a medium of instruction for effective teachers throughout the Tanjung Batu district implemented in SMP Negeri 2 Tanjung Batu. In the Tanjung Batu district, the teachers are still many who have not use web blog as a medium of learning even still there are teachers who have not been able to use the computer. On the other side of the school should implement kurikulum 2013 which requires applying computer-based learning. This training of 22 participants resulting from all able to switch on and off the computer correctly, all able to use the windows operating system are limited, 91% were able to create and utilize email, and 77% are able to create and manage web blog.
Sistem Pengamanan Data Menggunakan Kriptografi AES dan Blockchain Berbasis Android Dhiya Calista; Al Farissi; Mastura Diana Marieska
JUPITER (Jurnal Penelitian Ilmu dan Teknologi Komputer) Vol 13 No 2 (2021): JUPITER Edisi Oktober 2021
Publisher : Teknik Komputer Politeknik Negeri Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5281/3927.jupiter.2021.10

Abstract

Data or information security is a very important thing for internet users to pay attention to now, so that the data or information owned is not attacked by irresponsible parties. So, in this research, an implementation of a combination of Blockchain and AES cryptography will be carried out in order to avoid active and passive attacks by attackers. Blockchain method can detect data changes from attackers quickly and easily. However, Blockchain method can still be attacked passively, therefore AES method is combined with Blockchain as a complement that is used to encrypt data from plaintext to ciphertext so that existing data or information can be avoided from active or passive attacks. In this research, the software development method is using Rational Unified Process (RUP) method and the tests carried out are Blockchain resistance to modification attacks testing and Avalanche Effect testing on AES method. Keywords— Cryptography, Blockchain, AES, RUP, Avalanche Effect
Medical Image Encryption by Using Modification of SomdipDey Advanced Encryption Image Technique Al Farissi; Agung Wahyu Nugroho; Megah Mulya
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (830.252 KB) | DOI: 10.11591/eecsi.v1.396

Abstract

The rapid growth of technology led the security ofdata becomes a very important issue, in particular data onmedical field. Therefore the security of data need to beconsidered. This research will focus on the security of medicalimage. The appropriate technologies to increase the security ofmedical image is the image encryption. This research, applied atechnique that can encrypt a medical image, it is SompdipDeyAdvanced Encryption Image Technique. This technique hasthree phases, namely Bits Rotation and Reversal, Extended HillCipher and Modified MSA Randomization. This research wasalso conducted on a modification of the stage Extended HillCipher that produces a better result so that the security ofmedical data will be increased.
Perancangan Sistem Pengatur Electrical Conductivity (EC) Air Menggunakan Kendali Logika Fuzzy Ahmad Rifai; Sarmayanta Sembiring; Al Farissi Al Farissi; Donny Giovanna Karo Karo
Informatik : Jurnal Ilmu Komputer Vol 16, No 1 (2020): April 2020
Publisher : Fakultas Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1296.09 KB) | DOI: 10.52958/iftk.v16i1.1683

Abstract

Telah dirancang sebuah sistem pengatur electrical Conductivity (EC) air dengan menggunakan kendali logika fuzzy. Sistem pengatur ini berfungsi untuk memutuskan banyaknya volume air dengan EC rendah/tinggi yang harus ditambahkan untuk mencapai EC air pada penampungan sesuai dengan target yang di inputkan. Penambahan air dengan EC rendah/tinggi dilakukan dengan mengalirkannya menggunakan pompa DC dan diditeksi menggunakan water flow sensor dengan penutup aliran menggunakan selonoid valve untuk memastikan volume air yang dialirkan telah sesuai dengan hasil sistem pengatur. Input sistem ini terdiri dari nilai EC air penambah (air dengan EC rendah dan air dengan EC tinggi), target EC air pada penampungan yang diinputkan dengan keypad 4x4, nilai EC air pada penampungan yang diditeksi sensor Konduktivitas, dan volume air pada penampungan yang diditeksi dengan menggunakan sensor ultrasonik. Hasil pengujian menunjukkan sistem telah dapat berjalan dengan baik, dimana sistem dapat menditeksi volume air dengan menggunakan sensor ultrasonik dengan error rata-rata penditeksian jarak sebesar 1,92%, penditeksi EC dengan menggunakan sensor Konduktivitas telah dapat menditeksi EC dengan error rata-rata sebesar 1,91%, sistem pengatur volume penambah telah berfungsi dengan baik dengan error rata-rata sebesar 1,87% dan kendali logika fuzzy telah dapat mengambil keputusan banyaknya volume penambah yang harus diberikan untuk mencapai EC target pada penampungan dengan error rata-rata terhadap pengukuran EC setelah hasil pencampuran sebesar 4,17%.
Komputasi Paralel GPU Dengan Teknologi Nvdia Cuda Untuk Enkripsi Berkas Pdf Menggunakan Algoritma RC4 DAN MD5 Al Farissi; Samatra Marwa Hany; Rifkie Primartha
Jurnal Sistem Informasi Vol 9, No 2 (2017)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (208.062 KB) | DOI: 10.36706/jsi.v9i2.7989

Abstract

AbstractOne way to secure files on storage media is by cryptographic techniques.The content of PDF files sometimes Contains with important information. therefore information security becomes a priority at this time. In this research, PDF files will be encrypted with MD5-RC4 technique. This combination makes information more secure and protected from information disclosure. This research implement parallel computing using GPU and CPU that make a performance of process run faster. When Nvidia released CUDA, GPU Become a strong power as an efficient accelerator for complex computations. Therefore, the GPU with CUDA and the comparision between CUDA and CPU will be discussed in this study.Keywords: PDF, Enkripsi,CUDA,MD5,RC4.
Securing Text File on Audio Files using Least Significant Bit (LSB) and Blowfish Ahmad Rizky Fauzan; Al Farissi; Muhammad Naufal Rachmatullah
Sriwijaya Journal of Informatics and Applications Vol 3, No 2 (2022)
Publisher : Fakultas Ilmu Komputer Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36706/sjia.v3i2.42

Abstract

Along with the development of technology, communication can be done in various ways, one of which is digital messages. But often the messages sent do not reach their destination and are obtained by irresponsible parties. This happens because of the lack of security in the file. For this reason, security is needed so that messages cannot be stolen or seen by other parties. There are various ways to secure messages, including Steganography and Cryptography techniques. This study uses a combination of the Least Significant Bit method and the Blowfish algorithm to secure secret messages in audio files. This research will measure encryption and decryption time, analysis of message file size changes after encryption and decryption, and PSNR value of audio files. The result of encryption using blowfish is a change in the size of the message file caused by the size of the message file is less than the block cipher size, so additional bytes are given so that the message size matches the block cipher size. The speed of the encryption and decryption process using the blowfish algorithm results in an average time for encryption of 547.98ms while the average time for decryption is 538.19ms. The longest time for the encryption process is 557.30ms and the fastest is 534.50ms, while the longest time for the decryption process is 548.74ms and the fastest is 531.46ms. Hiding messages in audio files using LSB produces PSNR values above 30dB.
Modification of Non-local Mean Algorithm Using Parallel Calculation for Image Noise Reduction Al Farissi; Wondo Wondo
Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI Vol. 12 No. 2 (2023)
Publisher : Prodi Pendidikan Teknik Informatika Universitas Pendidikan Ganesha

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23887/janapati.v12i2.58996

Abstract

Noise in digital image processing is a noise that occurs at pixel values due to random colour intensity. Several types of noise models include Gaussian noise, speckle noise, impulse noise, and Poisson noise. Before processing image data, a noise reduction process is required. One of the noise reduction algorithms used for gaussian noise models is Non-local Mean. This algorithm performs calculations sequentially on each pixel in the search block. Due to a large number of pixels and search block area in the image, the noise reduction process using the Non-local Mean algorithm is very slow. This study proposes the concept of parallel calculations for the Non-local Mean algorithm. This concept divides the search block into three parts and performs calculations on each part simultaneously. The experimental results show that the Non-local Mean algorithm with parallel calculations can reduce noise up to 30% faster if the noise standard deviation is above 30.