Polyalphabetic cipher cryptosystem application in making anti-hacker passwords learning management systems in junior high schools
Abstract
Research on developing an anti-hacker network security system for the learning management system was conducted at SMP Plus Darus Salam. Learning activities at SMP Plus Darus Salam use LMS as a media, which is a program to maximize learning activities at school. its also has risks, it is related to the security of students data work, so network security is needed. Network security used within computer networks to facilitate secure communication in different network entities based on predefined security protocols. On the other hand, the Learning Management System (LMS) is a software platform designed for online educational activities, e-learning programs, and educational resources, simplifying student engagement in learning processes. This study employs applied research methodology, focusing on a single tribune graph, and involves a labeling process for vertices and edges to construct a graph tree, resulting in the generation of ciphertext. This research aims to develop anti-hacker passwords in the SMP Plus Darusalam LMS using a polyalphabetic cipher cryptosystem. The research utilizes a data set comprising 24 LMS account samples. Data collection techniques encompass observation, interviews, distribution of questionnaires, and documentation, while data analysis involves tabulation and the generation of ciphertext codes in the form of usernames and passwords. Based on the results, it shows a total score of 2,096 with an average of 91.13 or a security percentage of 91.13%, which shows that it is successful and useful in the SMP Plus Darus Salam learning management system (LMS) account. Thus, it can be concluded that the secjar (network security) network security efforts made were successful and provided significant benefits in securing learning management system (LMS) accounts at SMP Plus Darus Salam. Therefore, the researcher suggests to the readers to conduct research on the development of anti-hacker network security using Tribun graphs with ???? = 1 and ???? = 2.
Downloads
References
Afrilian, A. (2017). Pemanfaatan Teknologi Informasi sebagai Sumber Belajar Siswa Kelas XI IPS SMA Negeri 1 Tengaran [Utilization of Information Technology as a Learning Resource for Class XI IPS Students at SMA Negeri 1 Tengaran.]. Doctoral dissertation, Program Studi Pendidikan Ekonomi FKIP-UKSW. https://repository.uksw.edu/handle/123456789/14142
Daniel, F. T., & Prida. N. L. (2019). Teori Graf [Graph Theory](T. Yulianti, Ed.; 1st ed.). CV Budi Utama.
Dwi, O. :, & Sudaryanto, H. (2017). Merancang Pengaman (Security) Jaringan Komputer [Designing Computer Network Security]. 07(1), 64-73. http://ejurnal.ppsdmmigas.esdm.go.id/sp/index.php/swarapatra/article/view/168
Fathul, A. (2021). Analisis tingkat keamanan sistem informasi akademik (Siakad) UIN Ar-Raniry menggunakan standar ISO 2700;2013 dengan klausul 11 dan 14 [Analysis of the security level of UIN Ar-Raniry's academic information system (Siakad) using the ISO 2700;2013 standard with clauses 11 and 14]. Repository Ar-Raniry.
Fauziah, D. A. (2017). Penerapan rainbow 2-connected pada graf khusus dan graf hasil operasi korona dan kartesian [Application of rainbow 2-connected to special graphs and graphs resulting from corona and Cartesian operations]. Repository Universitas Jember.
Fikri, R. N. (2015). Penerapan graf pada database system privilege [Application of graphs to database system privileges]. Program Studi Teknik Informatika Institut Teknologi Bandung.
Firmansah, F., Wahid, M., Prodi, S., & Matematika, P. (2016). Pelabelan harmonis ganjil pada graf kincir angin double quadrilateral [Odd harmonic labeling in double quadrilateral windmill graphs]. Unwidha Repository. http://repository.unwidha.ac.id:880/2637/
Gallian, J. A. (2018). A dynamic survey of graph labeling. Electronic Journal of Combinatorics, 1((DynamicSurveys), [#DS6]). https://experts.umn.edu/en/publications/a-dynamic-survey-of-graph-labeling-3
Indarta, Y., Ranuharja, F., Ashari, I. F., Sihotang, J. I., Simarmata, J., Harmayani, Algifari, M. H., Muslihi, M. T., Jamaluddin, Mahmudi, A. A., Fatkhudin, A., Gustiana, Z., Subowo, E., & Idris, M. (2022). Keamanan siber tantangan di era revolusi industri 4.0 [Cybersecurity challenges in the era of industrial revolution 4.0] (R. Watrianthos, Ed.; 1st ed.). Yayasan Kita Menulis.
Jamil, N. A. (2014). Super (a,d)-H antimagic total covering pada graf triangular ladder. Prosiding Seminar Matematika Dan Pendidikan Matematik, 1(1), 110-118. https://jurnal.unej.ac.id/index.php/psmp/article/view/915
Larasati, N. A., & Andayani, S. (2019). Pengaruh penggunaan learning management system (LMS) terhadap tingkat kepuasan mahasiswa menggunakan metode DeLone and McLean [The effect of using a learning management system (LMS) on student satisfaction levels using the DeLone and McLean method]. Jurnal Teknik Informatika Unika Santo Thomas, 4(1), 13-20. https://doi.org/10.17605/jti.v4i1.506
Listiawan, T. (2016). Pengembangan learning management system (LMS) di program studi pendidikan matematika STKIP PGRI Tulungagung [Development of a learning management system (LMS) in the STKIP PGRI Tulungagung mathematics education study program]. Jurnal Ilmiah Pendidikan Informatika), 1(1), 14ā22. https://doi.org/10.29100/jipi.v1i01.13
Mahmudah, M. (2014). Pelabelan total super (a;d)-sisi antimagic pada graf tribun [Antimagic super(a;d)-edge total labeling of tribune graphs]. Repository Universitas Jember.
Mahmudah, M. (2016). Analisis keterkaitan seatl graf konektif dan diskonektif serta aplikasi dalam pengembangan kriptosistem polyalphabetic cipher [Analysis of the connection between connective and disconnective Seatl graphs and application in the development of polyalphabetic cipher cryptosystems]. Repository Universitas Jember.
Mahmudah, M., Novita Irawati, T., & Islam Jember, U. (2020). Cryptosystem Polyalphabetic Cipher Application. AXIOMA Jurnal Program Studi Pendidikan Matematika Universitas Islam Jember, 5(1), 11-19. https://doi.org/10.36835/axi.v5i1.539
Mania, S. (2017). Observasi sebagai alat evaluasi dalam dunia pendidikan dan pengajaran [Observation as an evaluation tool in the world of education and teaching]. Jurnal Ilmu Tarbiyah Dan Keguruan, 11(DESEMBER), 220ā233. https://doi.org/https://doi.org/10.24252/lp.2008v11n2a7
Muktyas, I. B., & Sugeng, K. (2014). Pemanfaatan pelabelan graceful pada symmetric tree untuk kriptografi polyalphabetic [Utilization of graceful labeling in symmetric trees for polyalphabetic cryptography]. Gramedia Pustaka Utama.
Purnama, B. (2014). Pengamanan pesan rahasia melalui kriptografi vigenere cipher dengan kunci berlapis [Securing secret messages through vigenere cipher cryptography with layered keys]. Jurnal Ilmiah Media Processor, 9(3), 264-269. https://ejournal.unama.ac.id/index.php/processor/article/view/243
Purwanto, D. (2020). Peranan kriptografi dalam peningkatan pengamanan sistem informasi [The role of cryptography in increasing information system security]. Seminar of Social Sciences Engineering & Humaniora, 1(1), 188-193. https://jurnal.pancabudi.ac.id/index.php/scenario/article/view/1177
Rizqy Aprilia, K., Hesti, I. A., & Dafik. (2014). Pelabelan total super (a,d)-sisi antimagic pada graf semi parasut SP 2nā1 [Antimagic total labeling of super (a,d)-edges on SP 2nā1 semi-parachute graphs]. Prosiding Seminar Matematika Dan Pendidikan Matematik, 1(5), 88-96. https://jurnal.unej.ac.id/index.php/psmp/article/view/912
Siagian, M. D. (2016). Kemampuan koneksi matematik dalam pembelajaran matematika [Mathematical connection abilities in mathematics learning]. MES: Journal of Mathematics Education and Science, 2(1), 58-67. https://doi.org/10.30743/mes.v2i1.117.
Siahaan, A. P. U., Aryza, S., Hariyanto, E., Hasudungan Lubis, A., Ikhwan, A., & Len Eh Kan, P. (2018). Combination of levenshtein distance and rabin-karp to improve the accuracy of document equivalence level. International Journal of Engineering & Technology, 7(2.27), 17-21. https://doi.org/10.14419/ijet.v7i2.27.12084
Sitoyo, S., & Sodik, M. A. (2015). Dasar metodologi penelitian [Basic research methodology] (Ayup, Ed.; 1st ed.). Literasi Media Publishing.
Sugiyono, P. D. (2019). Metode penelitian pendidikan (kuantitatif, kualitatif, kombinasi, R&D dan penelitian tindakan) [Educational research methods (quantitative, qualitative, combination, R&D and action research)]. Bumi Aksara.
Sutabri, T. (2012). Analisis sistem informasi [Information systems analysis] (C. Putri, Ed.). CV Andi Offset.
Wibowo, A. T., Akhlis, I., & Nugroho, S. E. (2014). Pengembangan LMS (learning management system) berbasis web untuk mengukur pemahaman konsep dan karakter siswa [Development of a web-based LMS (learning management system) to measure student understanding of concepts and character]. Scientific Journal of Informatics, 1(2), 127-137. https://doi.org/10.15294/sji.v1i2.4019
Copyright (c) 2024 Alifmatika: Jurnal Pendidikan dan Pembelajaran Matematika
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
COPYRIGHT NOTICE
Author (s) who publish in Alifmatika: Jurnal Pendidikan dan Pembelajaran Matematika agree to the following terms:
- The Author (s) submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to Alifmatika: Jurnal Pendidikan dan Pembelajaran Matematika, Tarbiyah Faculty of Ibrahimy University as the publisher of the journal. Consecutively, author(s) still retain some rights to use and share their own published articles without written permission from Alifmatika: Jurnal Pendidikan dan Pembelajaran Matematika. This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
- Copyright encompasses rights to publish and provide the manuscripts in all forms and media for the purpose of publication and dissemination, and the authority to enforce the rights in the manuscript, for example in the case of plagiarism or in copyright infringement.
- Alifmatika: Jurnal Pendidikan dan Pembelajaran Matematika and the Editors make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in Alifmatika: Jurnal Pendidikan dan Pembelajaran Matematika are the sole responsibility of their respective authors and advertisers.
- The Copyright Transfer Form can be downloaded here [Copyright Transfer Form Alifmatika]. The copyright form should be signed originally and send to the Editorial Office in the form of original mail, scanned document to alifmatika[at]ibrahimy.ac.id or upload the scanned document in the comments column when sending the manuscript.