Pengamaman informasi sudah menjadi hal yang wajib dalam era revolusi teknologi informasi. Penggunaan internet dalam perangkan cerdas dan multiplatform akan menjadi celah bagi kriptanalis untuk mencurangi informasi. Kriptografi adalah salah satu teknik pengamanan informasi yang hingga saat ini memiliki banyak metode didalamnya. Meskipun demikian, informasi yang sandikan akan tetap memiliki celah kelemahan. Penggabungan teknik kriptogarfi dengan metode fuzzy banyak diusulkan dalam rangka peningkatan kualitas informsi yang disandikan. Dengan melakukan penelusuran sistematis literatur, ditemukan beberapa artikel yang mulai menggabungkan kriptografi dan fuzzy. Penelusiran ini bertujuan untuk melihat bagaimana peranan fuzzy dalam bidang kriptografi. Hasil yang diperoleh adalah adanya peningkatan kualitas bentuk pengamanan informsi yang dipadukan dengan fuzzy melalui beberapa cara. Selain itu, penggunaan fuzzy juga tidak terbatas dalam peningkatan keamanan. Fuzzy juga berperan dalam pemilihan kunci dan password terbaik serta penerbitan angka acak dari sebuah PRNG.
Teknik kriptografi dan steganografi berperan penting dalam pengamanan informasi. Gabungan keduanya memberikan tingkat keamanan informasi yang lebih kuat dan sulit dipecahkan. Model enkripsi Parallel Encryption with Digit Arithmetic of Covertext (PDAC) mengadopsi kriptografi dan steganografi dalam pengamanan pesan. Penggunaan PDAC sebagai algoritma enkripsi memerlukan kesesuaian pada proses pemilihan coverteksnya. Ketepatan jumlah covertext dalam PDAC mempengaruhi berjalan atau tidaknya PDAC dalam mengenkripsi pesan. Jika jumlah pesan sangat panjang maka akan menjadi sulit bagi pengguna dalam menentukan coverteksnya dan jika jumlah covertext PDAC tidak sesuai, maka proses enkripsi akan menjadi tidak sempurna. Penelitian ini melakukan pengubahan model yang bertujuan menutup celah PDAC. Modifikasi model yang diusulkan mengadopsi penggunaan covertext yang diterapkan secara berulang. Perulangan covertext yang diterapkan dalam PDAC mampu memproses pengamanan informasi secara menyeluruh. Keuntungan lain yang diperoleh ialah modifikasi ini memudahkan pengguna untuk menggunakan PDAC tanpa harus memenuhi kebutuhan minimum covertextnya
The readiness of product inventory is very important, product shortages related to other products can make buyers disappointed and then cancel to buy products that were previously planned to be purchased at once. Sellers can experience a decrease in the number of sales to revenue. In this case, the seller needs to know the pattern of customer habits when making purchases by going through sales transaction data that has occurred. Association techniques can be used to analyze the pattern of interrelationships between items in transaction events. With the a priori algorithm as a popular association algorithm, the pattern of sales transaction data can be analyzed through the research stage. From the implementation of the algorithm with 1063 transaction data using 10% min-support and 75% min-confidence resulting in 4 association rules where 1) if you buy "kacer" and "love bird" you will buy "pentet" as much as 17% support, 2) if you buy "magpie" and "love bird" will also buy "pentet" at 16%, 3) if you buy "kacer" and "magpie" then you will buy "pentet" at 14%, 4) if you buy "anis" you will buy "pentet" of 11% with a confidence level of 76%, 81%, 84%, 77%, respectively. So, there are 5 main items that play a strong role in the rule that must be considered. Sellers can use the resulting item relationship patterns as consideration in managing inventory and structuring the items sold.
Steganography is the art and science of writing hidden messages or hiding messages in such a way that, apart from the sender and the recipient, no one knows or is aware that there is a secret message (it does not appear that there is a hidden message. Furthermore, public key cryptography is the type of cryptography that using two interrelated keys, namely the public and private keys. Cryptography and steganography techniques have an important role in securing information. Parallel Encryption with Digit Arithmetic of Covertext (PDAC) encryption model adopts cryptography and steganography for securing messages. The accuracy of the number of covertext in the PDAC affects whether the PDAC works. If the number of PDAC covertext does not match, then the encryption process will be imperfect. This study aims to close the PDAC gap. The proposed model adopts the repeated use of covertext. Covertext loops applied in PDAC can process information security. Another advantage obtained is that this modification makes it easier for users to use PDAC without having to meet the minimum covertext requirement.
The rapid technological revolution had an impact on a variety of information security techniques. This will be important because information can be confidential to some entities that communicate with each other. Internet in intelligent technology will be a loophole for cryptanalysts to look for information vulnerabilities. Cryptography is a method of securing data and information which is currently still supported by the development of the method. However, the data and information that are secured will still have vulnerabilities in their delivery. The combination of fuzzy logic techniques with cryptographic techniques has been applied to support the improvement of information security. This study applies a systematic literature review method, to find articles that combine the two fields. The purpose of this study is to see the development of information security techniques with a fuzzy logic approach. As a result, it is found that the development of cryptographic and steganographic techniques that utilize fuzzy logic to help improve information security. In addition, the use of fuzzy logic is also not limited to increasing security. Fuzzy logic also plays a role in selecting the best key and password and issuing random numbers from a Pseudo-Random Number Generator (PRNG).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.