Dony Ariyus
Unknown Affiliation

Published : 5 Documents
Articles

Found 5 Documents
Search

IMPLEMENTASI HILL CIPHER PADA KODE TELEPON DAN FIVE MODULUS METHOD DALAM MENGAMANKAN PESAN Hasan, Patmawati; Yunita, Selviana; Ariyus, Dony
SISFOTENIKA Vol 10, No 1 (2020): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v10i1.521

Abstract

 The development of sophisticated technology in this era is increasingly rapid, messages that are hidden or kept a secret from people who want to access the secret message need to be safeguarded by the security of the message. One way to be able to hide the secret message so that it is not known or understood by people who do not have rights in the message is to change the message into a secret password and insert using cryptographic and steganographic techniques. A security system built using a combination of the Hill cipher algorithm and Five Modulus Method with the aim of making security strong and layered without reducing or damaging the text messages in the image. The system built using the programming language Matlab. The algorithm used has advantages in encrypting data. Hill Cipher uses a size (m x m) matrix as the key to encrypting and decrypting data. Whereas for steganography uses the Five Modulus Method by checking all pixels in blocks (k x k) and converting each pixel into a number that is divisible by 5. The results of this study are security systems that use the Combination of Hill Cipher and Five Modulus Methods in Securing Text Messages. Based on the results of the accuracy of testing five (5) times on different plaintexts, an accuracy rate of 100% is found, ie there is no difference in the results of encryption or decryption.
Modifikasi Algoritma Hill Chiper dan Twofish Menggunakan Kode Wilayah Telepon Yunita, Selviana; Hasan, Patmawati; Ariyus, Dony
SISFOTENIKA Vol 9, No 2 (2019): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/jst.v9i2.489

Abstract

  Kemajuan teknologi informasi telah memberikan dampak yang sangat luas, salah satunya sebagai media penyampaian informasi dari suatu tempat ke tempat lainnya, sehingga memudahkan orang dalam mengakses suatu informasi. Kemudahan pengaksesan media komunikasi oleh semua orang, tentunya akan memberikan dampak bagi keamanan informasi atau pesan yang menggunakan media komunikasi tersebut. Informasi menjadi sangat rentan untuk diketahui, diambil dan dimanipulasi oleh pihak-pihak yang tidak bertanggung jawab.  Salah satu alternatif yang dapat digunakan untuk menjaga kerahasiaan adalah dengan menyamarkan menjadi bentuk tersandi yang tidak bermakna, yang dapat dilakukan dengan menggunakan kriptografi. Oleh sebab itu dibutuhkan suatu metode atau cara yang dapat menjaga kerahasiaan informasi ini, yang salah satunya dikenal dengan sebutan kriptografi. Dalam kriptografi terdapat banyak algoritma, Twofish salah satu kandidat AES, karena Twofish memenuhi semua kriteria  yang dibutuhkan oleh NIST, yaitu 128-bit block, 128 bit, 182 nit, dan 256 bit key. Hasil dari penelitian ini adalah mengaplikasikan modifikasi algoritma hill cipher dengan kode wilayah yang kemudian di enkripsi dengan menggunakan metode Twofish dalam proses enkripsi dan dekripsi file agar kriptanilisis sulit memecahkan chipertextnya sehingga keamanan data tetap terjaga keasliannya. Kata kunci— kriptografi, hill cipher, twofish
Analisis Penerapan Modifikasi Algoritma Vigenere Cipher, Caesar Cipher, Vernam Cipher dan Hill Cipher Untuk Penyisipan Pesan Dalam Gambar Fatonah, Siti; Yulandari, Anisa; Ariyus, Dony
Jurnal VOI (Voice Of Informatics) Vol 8, No 2 (2019)
Publisher : STMIK Tasikmalaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Saat ini informasi merupakan elemen yang sangat penting dalam kehidupan manusia. Menjaga keamanan informasi plaintext dapat dilakukan melalui proses enkripsi dalam kriptografi. Penelitian sebelumnya, berbagai algoritma yang dapat digunakan untuk melakukan enkripsi maupun dekripsi dalam kriptografi. Penelitian ini melakukan pengamanan pesan dengan menyisipkan pesan pada sebuah gambar menggunakan algoritma steganografi LSB (least Significant Bit) pada pesan yang telah dienkripsi menggunakan modifikasi algoritma vigenere cipher, hill cipher, vernam cipher dan hill cipher. Hasil penelitian ini pesan dapat disembunyikan dalam gambar dengan meletakkan pesan pada bit terakhir gambarKata Kunci—kriptografi, steganografi, keamanan informasiInformation is a very important element in human life. Maintaining the security of plaintext information can be done through encryption in cryptography. Previous research, various algorithms that can be used to encrypt and decrypt cryptography. This study secures messages by inserting messages on an image using the least significant LSB steganography algorithm on messages that have been encrypted using a modified vigenere cipher algorithm, hill cipher, vernam cipher and hill cipher. The results of this study message can be hidden in the image by placing a message on the last bit of the image.. Keywords—cryptography, steganography, information security
Combination of XOR Binary Algorithm and Steganography Using Least Significant Bit (LSB) Method for Data Security Tetik, Yulius Nahak; Neno, Friden Elefri; Ariyus, Dony
Compiler Vol 8, No 2 (2019): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1045.233 KB) | DOI: 10.28989/compiler.v8i2.471

Abstract

Along with the development of technology and information today, data security is a problem that needs to be done to maintain the confidentiality of data or information both personally and within an organization. Cryptography is one of the sciences or arts that learns about how to secure data or information from irresponsible parties who want to destroy important data in the form of text and image files. This research, data security technique uses two algorithms, namely steganography to enter text in image media using LSB (Least Significant Bit) method and Binary XOR used to convert messages to binary with XOR keywords and generate pixel values of messages from 8 bits of images with LSB (Least Significant Bit). After encrypted the image will be sent to the user, and to view the original data, the user must decrypt the data with the message key and retrieve the LSB (Least Significant Bit) value, from the encrypted image.
PENDEKATAN STEGO-KRIPTO MODE CIPHER BLOCK CHAINING UNTUK PENGAMANAN INFORMASI PADA CITRA DIGITAL Wati, Vera; Sa?diyah, Hanifatus; Ariyus, Dony
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 5 No 2 (2020): JITK Issue February 2020
Publisher : PPPM STMIK Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/jitk.v5i2.1160

Abstract

The digital image can be one of the media for information security. The contents of information have an important value of effectiveness, one of which is as a support in decision making. Then the information needs to be done to safeguard the authority of parties who are not responsible. Such security can utilize Steganography and Cryptography (Stego-Crypto). The method used combines Stego-Crypto by randomizing information using Cipher Block Chaining (CBC) then the encryption results are secured through digital images. Based on the test results by measuring the capacity of information on the image produces test data if CBC can process characters in uppercase, spaces and other characters and the results of plaintext and ciphertext produce a ratio of 1: 2, but the LSB performance only accommodates characters depending on the number of sizes on digital image. Testing by evaluating the difference in pixel histogram, when viewed with an invisible not very visible difference, but the insertion of messages with 100-200 characters causes the addition of the average image size on stego images larger than 1: 4, the value of 1 from the original image. Besides, testing with the help of communication media, stego images or encrypted images is able to use email to send stego images because LSB is sensitive to the process of resizing images