scholarly journals Application of Gost Algorithm For The Safety of Data Sending of General Election

Elkawnie ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 121
Author(s):  
Novan Wijaya

Abstract : The rapid development of the internet has an impact on the security of data sent using internet media. One government agency that uses the internet as data transmission includes the KPU. Data transmission becomes very risky especially the data sent is very important and even confidential. In the internet world, there are many threats and ways to change or retrieve data sent via the internet. Indonesia in particular has conducted direct elections but the data that are in the regions which are the results of recapitulation of the elections will be sent via the internet with a system provided by the KPU. Data from the recapitulation of regional elections becomes very important because it can be changed by intruders. Secure the data sent, methods such as cryptographic techniques that can minimize interference from intruders are needed. One algorithm that can be applied as data security is the GOST algorithm. The GOST algorithm is designed to take a balance between data efficiency and security. Cryptographic techniques that use the GOST algorithm are expected to be able to increase the security of sending election results from various threats without reducing the performance of sending data. The rapid development of the internet has the impact of the security of data sent using internet media. One government agency that uses the internet as data transmission includes the KPU. Data transmission becomes very risky especially the data sent is very important and even confidential. In the internet world, there are many threats and ways to change or retrieve data sent through internet media. Indonesia in particular has conducted direct elections but the data that are in the regions which are the results of recapitulation of the elections will be sent via the internet with a system provided by the KPU. Data from the recapitulation of regional elections becomes very important because it can be changed by intruders. Secure the data sent, methods such as cryptographic techniques that can minimize interference from intruders are needed. One algorithm that can be applied as data security is the GOST algorithm. The GOST algorithm is designed to take a balance between data efficiency and security. Cryptographic techniques that use GOST algorithm can improve the security of sending election results from various threats without reducing the performance of sending data. Election result data that was conducted during the testing was the Ogan Ilir regional election recap data. Tests that have been carried out using the GOST algorithm using WireShark produce stream files sent over the network are not easily identified because they are converted into random strings, so it takes a long time to analyze them.Abstrak : Perkembangan internet yang sangat cepat mempunyai dampak diantranya keamanan data yang dikirim menggunakan media internet. Salah satu instansi pemerintahan yang menggunakan internet sebagai pengiriman data diantaranya KPU. Pengiriman data menjadi sangat beresiko terlebih data yang dikirimkan sangat penting bahkan bersifat rahasia. Didunia internet terdapat banyak ancaman serta cara dalam mengubah atau mengambil data yang dikirimkan melalui media internet. Indonesia pada khususnya telah melakukan pemilu secara langsung tetapi data-data yang berada pada daerah yang merupakan hasil rekapitulasi dari pemilu akan dikirimkan melalui internet dengan sistem yang telah disediakan oleh KPU. Data hasil rekapitulasi pemilu suatu daerah menjadi sangat penting dikarenakan bisa diubah oleh intruder. Untuk mengamankan data yang dikirimkan diperlukan metode seperti teknik kriptografi yang bisa meminimalisir gangguan dari para intruder. Salah satu algoritma yang bisa diterapkan sebagai keamanan data yaitu algoritma GOST. Algoritma GOST dirancang agar mengambil keseimbangan antara efisiensi dan keamanan data. Teknik kriptografi yang menggunakan algoritma GOST mampu meningkatkan keamanan pengiriman data hasil pemilu dari berbagai ancaman tanpa mengurangi performansi dari pengiriman data. Data hasil pemilu yang dilakukan saat pengujian ialah data rekap pilkada Ogan Ilir. Pengujian yang telah dilakukan menggunakan algoritma GOST menggunakan wireshark menghasilkan stream file yang dikirim melalui jaringan tidak mudah diidentifikasi dikarenakan diubah menjadi string acak sehingga membutuhkan waktu yang lama untuk menganalisanya.

2018 ◽  
Vol 8 (2) ◽  
Author(s):  
Lusia Handayani ◽  
Munawar K. Nahrawi

<p>Food is the fundamental right of every human being. Communities or nations that are not satisfied with food sufficiency will have the potential to cause economic instability and even to bring down a government. Dependence on rice as a staple food can threaten economic and political stability when food is not adequately covered. One alternative that can be made to avoid the threat is to switch to other carbohydrates-based foods that grow in Indonesia, including sweet potato, cassava, arrowroot, and ganyong. However, those local food variety is still considered as second-class food, due to the persistence to rice-eating culture. Therefore, there is a necessity to create a local food campaign on internet media. The Internet is now growing into a medium capable to reach all kinds of people in a quick and precise manner. This descriptive study uses secondary data such as books and journals related to state defense and food security. The study finds that the use of internet as a medium for local food campaign to the community has not been implemented optimally, both by the government and non-government. In line with the rapid development of the internet and the importance of defending the country in all aspects, local food campaigns through internet media require the participation of all stakeholders.</p><p align="left"> </p><strong>Keywords</strong>: defending of the state, local food campaign, internet


Author(s):  
Elly Mufida ◽  
Dedi Irawan ◽  
Giatika Chrisnawati

Technology VPN (Virtual Private Network) allows everyone to be able to access the local network from outside by using the internet. Through the VPN, the user can access the resources within the local network, gain rights and settings are the same as physically being in a place where the local network is located. Data security and secrecy of data transmission from unauthorized access in transmission on the Internet becomes the main standard in the VPN, so that the VPN is always included will be the main feature is the encryption and tunneling.


2018 ◽  
Vol 7 (2.27) ◽  
pp. 231 ◽  
Author(s):  
Satria Abadi ◽  
Miftachul Huda ◽  
Aminudin Hehsan ◽  
Ahmad Marzuki Mohamad ◽  
Bushrah Basiron ◽  
...  

Online transactions are transactions made sellers and buyers online through the Internet media, there is no direct encounter between buyers and sellers. Currently with the rapid development of technology and the Internet in Indonesia, has had a great impact on the change of industrial business. That is starting from the way advertising, buying and selling, how to interact between humans, and so forth. With e-commerce has changed a lot in the process of buying and selling. Panda Alami is one of the banana chips industry established since 1998 in Cipadang Pesawaran village. This banana chips industry still uses manual way in transaction process. To increase the turnover and profit that is the purpose of this study, the transaction model is developed with SDLC (System Development Life Cycle) and software used to design and design this application is PHP programming language, MySQL Database and Adobe Photoshop CS3. Features include product search, order, delivery and payment confirmation and thus provide integration of the entire inventory unit sales network. An equally important factor is trust. In this process trust is the main capital. Because without the trust of both parties, then the process of online transactions can not happen and done.  


2018 ◽  
Vol 7 (2) ◽  
pp. 880
Author(s):  
G Manikandan ◽  
R Jeeva Dharani ◽  
R Maya

Information security is a key challenge in today’s information era where a huge volume of data is being generated on the internet as a result of the online transaction. This data needs to be protected from the unauthorized users on the web. Cryptography is used to ensure the confidentiality and integrity of data in the virtual world. The strength of the cryptographic algorithm relies on the complexity involved in retrieving the original content from the unintelligible information. The system proposed in this paper focuses on the use of a different mechanism to increase complexity involved in the cryptanalysis. Different cryptographic techniques are used to create a modified plain text and modified key. The newly generated key is used to encrypt the modified plaintext to generate the ciphertext. From the security analysis, it is evident that the time taken for cryptanalysis by the proposed scheme is more when compared with the existing systems.  


2021 ◽  
Vol 2 (4) ◽  
pp. 227-234
Author(s):  
Dermawan Lumban Toruan

Document file is a means of transforming information from one person to another or from a group to another. The development of computerized technology has greatly increased. Document files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of document files, this can be done by using cryptographic techniques. Cryptography is the science of keeping data secure. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA, which stands for Secure Hash Algorithm, is a standard hash function published by NIST (National Institute of Standards and Technology), (NIST, 1995a). This study will use the SHA-1 method to secure the authenticity of document files, document confidentiality, document integrity, and document authentication. This study describes the security process for detecting the authenticity of document files using the SHA-1 method in the form of detection so that confidential documents sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of document files.


Author(s):  
Nhan Tam Dang ◽  
Hai-Duong Le ◽  
Son Thanh Le ◽  
Ha Manh Tran

The 21st century has witnessed the rapid development of small and convenient mobile devices such as smartphones, tablets, game players, sensor nodes, etc. The rise of such mobile devices indicates the increase of colossal data transmission through the Internet and online services along with the challenges of data security. It is common to think of a solution to protect sensitive data from unauthorized users, and the most popular solution is to use encryption. While many research activities in functional encryption have widely been applied to network devices, computers, and applications, mobile devices still attract much attention to security issues due to the limitations of system resources, connectivity, data transmission and power consumption that malicious users can exploit to launch attacks. Especially, mobile devices have become a principal tool to share data on the Internet through online services, such as Facebook, Youtube, DropBox, Amazon, Online Games, etc. This paper presents a study of the Attribute-Based Encryption (ABE) scheme that exploits user attributes to build the secret key and the ciphertext. ABE encryption is specified by a set of attributes or a policy defining attributes that users possess. The paper also describes a few implementations of ABE applied in the cryptography community and the challenges of integrating ABE into real-world applications. Finally, the paper proposes an implementation of ABE for Android mobile devices. This implementation associated with the Kerberos protocol can be applied to secured data sharing applications. The Kerberos protocol aims at providing mutual authentication for the client server model. Experiments have evaluated the proposed ABE implementation on Android mobile devices along with the Kerberos system. The evaluation also includes ABE performance with discussions and lessons learned.


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


Author(s):  
Tetyana Jezhyzhanska

In the information society the status of information is changing: this main value of global civilization becomes an important resource of socio- economic, technological and cultural development. The rapid development of virtual technologies and the growing number of Internet users in Ukraine and in the world causes the new challenges to communication of each organization. The book publishers are also obliged to respond to these processes. However, the works devoted directly to publishers’ communication in the modern media space are still lacking in Ukraine. The objective of the article is to clarify peculiarities and conditions of the activities of Ukrainian book publishers in today’s media space which is an important issue today. It is analyzed the literature and sources on this issue and it is ascertained the theoretical and practical possibilities to take into account the trends in the world of modern media in the PR-activity of book publishers. Also the prospects for further scientific study and practical use of PR-communications in the activity of publishers are determined. The analysis of current changes in the modern information space allows us to trace the general tendencies: the new subject and object areas are formed; the number of subjects is expanded; the new formats of interaction within the system of communications of the organization and in society as a whole are created. That means that publishing house’s PR-communications are complicated by the emergence of new elements, such as active audience, social networks as communication channels, promotions on the Internet and others. PR communication in the Internet space is the most effective and inexpensive tool for interaction of publishers with active audiences. Thus, the activation of PR communication in the modern media space is associated with the emergence of the latest information technologies, online media as well as development of Internet. The use of online channels of Internet for communication with the target audience of publishing organizations has certain advantages over traditional media. At the same time, it is necessary to take into account the information saturation of media space, which complicates the way of PR-messages of book publishers to the reader.


Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


Sign in / Sign up

Export Citation Format

Share Document