Abstract-Just like conventional signatures, digital signatures can be used to prove the authenticity of a document in digital form. In addition, digital signatures can also be used to prove the validity of the author of the document, so that the author of the document can not deny that he had made the document. Digital signature is done by applying two cryptographic algorithms sequentially. The first algorithm is to impose hash function on a real document to produce message digest, and the second one is to impose a public key algorithm to the digest form. Keccak hash function is an algorithm that has been set as SHA-3 in a competition held by NIST and can be used to determine if a document has been modified or not. RSA is a public key algorithm which ensures the safety in the form of authentication and non-repudiation, so it is suitable with the actual purpose of digital signature. This paper implements the Keccak and RSA algorithm on digital signature as well as comparing it with the use of MD5. The test results of the implementation of both algorithms show that the establishment of digital signature on a whole process requires a relatively short time, and it is able to achieve the goals of digital signatures to guarantee the security in the aspects of integrity, authentication and non-repudiation.Intisari-Sama halnya seperti tanda tangan konvensional, tanda tangan digital dapat digunakan untuk membuktikan keaslian sebuah dokumen dalam bentuk digital. Selain itu, tanda tangan digital juga dapat digunakan untuk membuktikan keabsahan pembuat dokumen sehingga pembuat dokumen tidak dapat menyangkal bahwa dia yang telah membuat dokumen tersebut. Tanda tangan digital dilakukan dengan menerapkan dua algoritme kriptografi secara sekuensial. Algoritme pertama adalah memberlakukan fungsi hash pada dokumen asli untuk menghasilkan message digest, dan yang kedua adalah dengan memberlakukan algoritme kunci publik terhadap bentuk digestnya. Keccak merupakan algoritme fungsi hash yang telah ditetapkan menjadi SHA-3 dari kompetisi yang diadakan oleh NIST dan dapat digunakan untuk mengetahui apakah sebuah dokumen telah dimodifikasi atau tidak. RSA adalah algoritme kunci publik yang menjamin aspek keamanan dalam bentuk autentikasi dan non-repudiation, sehingga sesuai dengan tujuan tanda tangan digital yang sebenarnya. Makalah ini mengimplementasikan algoritme Keccak dan RSA pada tanda tangan digital serta melihat perbandingannya dengan MD5. Hasil pengujian dari implementasi kedua algoritme di atas menunjukkan bahwa pembentukan tanda tangan digital secara keseluruhan memerlukan waktu yang relatif singkat, serta tercapai tujuan tanda tangan digital dalam menjamin keamanan pada aspek integritas, autentikasi, dan non-repudiation. Kata Kunci -tandatangan digital, Keccak, RSA, integritas, autentikasi, non-repudiation I. PENDAHULUAN Pada dunia nyata, tanda tangan digunakan untuk mengidentifikasi keabsahan seseorang pada dokumen yang ditandatanganinya. Selain itu, tanda tangan juga dapat digunakan untuk membuktikan bahwa penandatangan te...
One way to handle waste of garbage problems can be done by determining the location of any Temporary Shelters that can be visited first. To determine this, it is necessary to find the distance between the location where the driver is located and which Temporary Shelter is available. This study aims to find the distance between the location of drivers and Temporary Shelters using the Haversine formula that can produce a distance between two points on the surface of the globe. The study was conducted by taking the location of drivers and Temporary Shelters in the form of coordinate points, calculating the distance between the points where drivers and Temporary Shelters are located, and comparing the results of distances obtained. The results of the study are a list of drivers and Temporary Shelters’ distances from the smallest order. With the selection of visits from the closest distance first, it is expected that drivers can save costs and travel time taken to visit all Temporary Shelters and end up at Waste End Processing Sites.
<p><span>Aplikasi layanan pengaduan yang diberikan oleh PT umumnya hanya berfokus terhadap pelayanan yang diberikan kepada mahasiswa sebagai pengguna langsung terhadap jasa yang ditawarkan PT. Aplikasi tidak memberikan fasilitas terhadap pengaduan yang diberikan oleh pengguna jasa lainnya, misalnya oleh pengguna lulusan yang ingin memberikan pengaduan mengenai kompetensi lulusan yang dihasilkan agar dapat dijadikan masukan dalam memperbaiki kualitas mahasiswa yang dihasilkan maupun oleh masyarakat sasaran pengabdian masyarakat yang ingin memberikan saran mengenai materi pengabdian yang tidak sesuai dengan proposal kegiatan yang ditawarkan. Penelitian ini bertujuan membangun sebuah aplikasi berbasis web yang dapat digunakan seluruh pengguna jasa PT untuk melakukan pengaduan. Pembangunan aplikasi menerapkan metodologi rekayasa perangkat lunak agar dapat menghasilkan perangkat lunak tepat waktu. Metodologi yang digunakan adalah Extreme Programming. Hasil dari penelitian menunjukkan bahwa penerapan Extreme Programming pada pengembangan aplikasi mengakibatkan pengembangan dapat dilakukan secara cepat dengan jumlah anggota tim yang minimal. Hasil pengujian menggunakan metode black box aplikasi dapat dijalankan sebagaimana mestinya dan memenuhi acceptance criteria pada user story.</span></p><p> </p><p class="Judul2"><strong><em>Abstract</em></strong></p><p class="Judul2"> </p><p class="Abstract"><em>The complaint service system owned by College generally only focuses on the students in the improvement of services, this is because students are the direct users of the services offered by the College. Complaints service did not facilitate the complaints which may be given by other service users, such as graduates' user or community targeted in the society devotion activities undertaken by the College lecturer. This research aims to build a web-based application that can be used throughout the service users of the College to conduct complaints. Application development applying software engineering methodologies in order to provide the software on time. The methodology used is Extreme Programming. The result of the research shows that the application of the Extreme Programming in the development of applications resulted in development can be done quickly with a minimal number of the team member. The development can be done quickly because the application development started by building the simplest component in advance, i.e. account verification component, followed by other components. The results of the testing using black box method was the application can be run properly and meets the acceptance criteria on a user story.</em></p><p class="Judul2"> </p>
The problem of waste in big cities in Indonesia is still the main focus of the related department. Generally, the problem is the lack of garbage transport facilities that can be used to transport waste from the temporary shelter (Tempat Penampungan Sementara, TPS) to the final processing site (Tempat Pemrosesan Akhir, TPA). This lack of garbage transport makes the garbage contained in TPS not fully transportable to TPA due to limited capacity and operational time of the related service. In overcoming this problem, optimization of garbage transport facility utilization can be carried out to optimize the capacity of the garbage transported by finding the shortest path that can be traversed by the garbage transporter. This paper aims to apply the Bellman-Ford algorithm for determining waste collection routes. The Bellman-Ford algorithm allows a negative weighting for its edge value, so that it can anticipate the possible costs to be incurred in the selection of the garbage collection path. The stages of this paper were data requirements analysis, design, implementation, and testing. The results of the study are trajectories with a minimum cost from the origin location to the destination location, although it does not pass through all TPS that must be visited.
LPKA Palembang provides services to the community in the form of coaching in the fields of education, skills training, community guidance, and alleviation, services for Andikpas visits and complaints, remission submission services, assimilation, and other submissions especially to support alleviation programs such as the Conditional Leave (CB) program, Leaving Towards Free (CMB), and Parole (PB). To provide the best convenience and quality in providing services, a system is needed that can not only be used to submit and process service data online, but also can integrate service data so that it can be more easily accessed anytime and anywhere. The system created is an electronic dashboard or e-dashboard that can present data visually so that it is easily understood by readers. This study aims to build a prototype that can provide an overview of the e-dashboard system to be built. From the prototype evaluation, user feedback can be obtained which can be used to build an actual e-dashboard system so that it can reduce deviations from the system being built. The stages in this research are planning, designing, building, and evaluating the prototype. The results of this study are the development of e-Dashboard prototype that had been tested by 80% of LPKA Class I Palembang employees. The developed prototype has features that almost meet user needs because the system development is based on a quick analysis of the needs of future e-Dashboard users.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.