Polyalphabetic cipher cryptosystem application in making anti-hacker passwords learning management systems in junior high schools

  • Muhlisatul Mahmudah Mathematics Education, Jember Islamic University, East Java 68121, Indonesia
  • Tri Novita Irawati Mathematics Education, Jember Islamic University, East Java 68121, Indonesia
  • Friska B. Nur Aini Mathematics Education, Jember Islamic University, East Java 68121, Indonesia
Keywords: Anti-Hacker, Ciphertext, Network Security, Polyalphabetic, Learning Management System, Tribune Graph

Abstract

Research on developing an anti-hacker network security system for the learning management system was conducted at SMP Plus Darus Salam. Learning activities at SMP Plus Darus Salam use LMS as a media, which is a program to maximize learning activities at school. its also has risks, it is related to the security of students data work, so network security is needed. Network security used within computer networks to facilitate secure communication in different network entities based on predefined security protocols. On the other hand, the Learning Management System (LMS) is a software platform designed for online educational activities, e-learning programs, and educational resources, simplifying student engagement in learning processes. This study employs applied research methodology, focusing on a single tribune graph, and involves a labeling process for vertices and edges to construct a graph tree, resulting in the generation of ciphertext. This research aims to develop anti-hacker passwords in the SMP Plus Darusalam LMS using a polyalphabetic cipher cryptosystem. The research utilizes a data set comprising 24 LMS account samples. Data collection techniques encompass observation, interviews, distribution of questionnaires, and documentation, while data analysis involves tabulation and the generation of ciphertext codes in the form of usernames and passwords. Based on the results, it shows a total score of 2,096 with an average of 91.13 or a security percentage of 91.13%, which shows that it is successful and useful in the SMP Plus Darus Salam learning management system (LMS) account. Thus, it can be concluded that the secjar (network security) network security efforts made were successful and provided significant benefits in securing learning management system (LMS) accounts at SMP Plus Darus Salam. Therefore, the researcher suggests to the readers to conduct research on the development of anti-hacker network security using Tribun graphs with ???? = 1 and ???? = 2.

Downloads

Download data is not yet available.

References

Afrilian, A. (2017). Pemanfaatan Teknologi Informasi sebagai Sumber Belajar Siswa Kelas XI IPS SMA Negeri 1 Tengaran [Utilization of Information Technology as a Learning Resource for Class XI IPS Students at SMA Negeri 1 Tengaran.]. Doctoral dissertation, Program Studi Pendidikan Ekonomi FKIP-UKSW. https://repository.uksw.edu/handle/123456789/14142

Daniel, F. T., & Prida. N. L. (2019). Teori Graf [Graph Theory](T. Yulianti, Ed.; 1st ed.). CV Budi Utama.

Dwi, O. :, & Sudaryanto, H. (2017). Merancang Pengaman (Security) Jaringan Komputer [Designing Computer Network Security]. 07(1), 64-73. http://ejurnal.ppsdmmigas.esdm.go.id/sp/index.php/swarapatra/article/view/168

Fathul, A. (2021). Analisis tingkat keamanan sistem informasi akademik (Siakad) UIN Ar-Raniry menggunakan standar ISO 2700;2013 dengan klausul 11 dan 14 [Analysis of the security level of UIN Ar-Raniry's academic information system (Siakad) using the ISO 2700;2013 standard with clauses 11 and 14]. Repository Ar-Raniry.

Fauziah, D. A. (2017). Penerapan rainbow 2-connected pada graf khusus dan graf hasil operasi korona dan kartesian [Application of rainbow 2-connected to special graphs and graphs resulting from corona and Cartesian operations]. Repository Universitas Jember.

Fikri, R. N. (2015). Penerapan graf pada database system privilege [Application of graphs to database system privileges]. Program Studi Teknik Informatika Institut Teknologi Bandung.

Firmansah, F., Wahid, M., Prodi, S., & Matematika, P. (2016). Pelabelan harmonis ganjil pada graf kincir angin double quadrilateral [Odd harmonic labeling in double quadrilateral windmill graphs]. Unwidha Repository. http://repository.unwidha.ac.id:880/2637/

Gallian, J. A. (2018). A dynamic survey of graph labeling. Electronic Journal of Combinatorics, 1((DynamicSurveys), [#DS6]). https://experts.umn.edu/en/publications/a-dynamic-survey-of-graph-labeling-3

Indarta, Y., Ranuharja, F., Ashari, I. F., Sihotang, J. I., Simarmata, J., Harmayani, Algifari, M. H., Muslihi, M. T., Jamaluddin, Mahmudi, A. A., Fatkhudin, A., Gustiana, Z., Subowo, E., & Idris, M. (2022). Keamanan siber tantangan di era revolusi industri 4.0 [Cybersecurity challenges in the era of industrial revolution 4.0] (R. Watrianthos, Ed.; 1st ed.). Yayasan Kita Menulis.

Jamil, N. A. (2014). Super (a,d)-H antimagic total covering pada graf triangular ladder. Prosiding Seminar Matematika Dan Pendidikan Matematik, 1(1), 110-118. https://jurnal.unej.ac.id/index.php/psmp/article/view/915

Larasati, N. A., & Andayani, S. (2019). Pengaruh penggunaan learning management system (LMS) terhadap tingkat kepuasan mahasiswa menggunakan metode DeLone and McLean [The effect of using a learning management system (LMS) on student satisfaction levels using the DeLone and McLean method]. Jurnal Teknik Informatika Unika Santo Thomas, 4(1), 13-20. https://doi.org/10.17605/jti.v4i1.506

Listiawan, T. (2016). Pengembangan learning management system (LMS) di program studi pendidikan matematika STKIP PGRI Tulungagung [Development of a learning management system (LMS) in the STKIP PGRI Tulungagung mathematics education study program]. Jurnal Ilmiah Pendidikan Informatika), 1(1), 14ā€“22. https://doi.org/10.29100/jipi.v1i01.13

Mahmudah, M. (2014). Pelabelan total super (a;d)-sisi antimagic pada graf tribun [Antimagic super(a;d)-edge total labeling of tribune graphs]. Repository Universitas Jember.

Mahmudah, M. (2016). Analisis keterkaitan seatl graf konektif dan diskonektif serta aplikasi dalam pengembangan kriptosistem polyalphabetic cipher [Analysis of the connection between connective and disconnective Seatl graphs and application in the development of polyalphabetic cipher cryptosystems]. Repository Universitas Jember.

Mahmudah, M., Novita Irawati, T., & Islam Jember, U. (2020). Cryptosystem Polyalphabetic Cipher Application. AXIOMA Jurnal Program Studi Pendidikan Matematika Universitas Islam Jember, 5(1), 11-19. https://doi.org/10.36835/axi.v5i1.539

Mania, S. (2017). Observasi sebagai alat evaluasi dalam dunia pendidikan dan pengajaran [Observation as an evaluation tool in the world of education and teaching]. Jurnal Ilmu Tarbiyah Dan Keguruan, 11(DESEMBER), 220ā€“233. https://doi.org/https://doi.org/10.24252/lp.2008v11n2a7

Muktyas, I. B., & Sugeng, K. (2014). Pemanfaatan pelabelan graceful pada symmetric tree untuk kriptografi polyalphabetic [Utilization of graceful labeling in symmetric trees for polyalphabetic cryptography]. Gramedia Pustaka Utama.

Purnama, B. (2014). Pengamanan pesan rahasia melalui kriptografi vigenere cipher dengan kunci berlapis [Securing secret messages through vigenere cipher cryptography with layered keys]. Jurnal Ilmiah Media Processor, 9(3), 264-269. https://ejournal.unama.ac.id/index.php/processor/article/view/243

Purwanto, D. (2020). Peranan kriptografi dalam peningkatan pengamanan sistem informasi [The role of cryptography in increasing information system security]. Seminar of Social Sciences Engineering & Humaniora, 1(1), 188-193. https://jurnal.pancabudi.ac.id/index.php/scenario/article/view/1177

Rizqy Aprilia, K., Hesti, I. A., & Dafik. (2014). Pelabelan total super (a,d)-sisi antimagic pada graf semi parasut SP 2nāˆ’1 [Antimagic total labeling of super (a,d)-edges on SP 2nāˆ’1 semi-parachute graphs]. Prosiding Seminar Matematika Dan Pendidikan Matematik, 1(5), 88-96. https://jurnal.unej.ac.id/index.php/psmp/article/view/912

Siagian, M. D. (2016). Kemampuan koneksi matematik dalam pembelajaran matematika [Mathematical connection abilities in mathematics learning]. MES: Journal of Mathematics Education and Science, 2(1), 58-67. https://doi.org/10.30743/mes.v2i1.117.

Siahaan, A. P. U., Aryza, S., Hariyanto, E., Hasudungan Lubis, A., Ikhwan, A., & Len Eh Kan, P. (2018). Combination of levenshtein distance and rabin-karp to improve the accuracy of document equivalence level. International Journal of Engineering & Technology, 7(2.27), 17-21. https://doi.org/10.14419/ijet.v7i2.27.12084

Sitoyo, S., & Sodik, M. A. (2015). Dasar metodologi penelitian [Basic research methodology] (Ayup, Ed.; 1st ed.). Literasi Media Publishing.

Sugiyono, P. D. (2019). Metode penelitian pendidikan (kuantitatif, kualitatif, kombinasi, R&D dan penelitian tindakan) [Educational research methods (quantitative, qualitative, combination, R&D and action research)]. Bumi Aksara.

Sutabri, T. (2012). Analisis sistem informasi [Information systems analysis] (C. Putri, Ed.). CV Andi Offset.

Wibowo, A. T., Akhlis, I., & Nugroho, S. E. (2014). Pengembangan LMS (learning management system) berbasis web untuk mengukur pemahaman konsep dan karakter siswa [Development of a web-based LMS (learning management system) to measure student understanding of concepts and character]. Scientific Journal of Informatics, 1(2), 127-137. https://doi.org/10.15294/sji.v1i2.4019

Published
2024-06-30
How to Cite
Mahmudah, M., Irawati, T. N., & Aini, F. B. N. (2024). Polyalphabetic cipher cryptosystem application in making anti-hacker passwords learning management systems in junior high schools. Alifmatika: Jurnal Pendidikan Dan Pembelajaran Matematika, 6(1), 90-103. https://doi.org/10.35316/alifmatika.2024.v6i1.90-103
Abstract viewed = 115 times
FULL TEXT PDF downloaded = 62 times