Implementasi Kriptografi Pengamanan Data Soal Ujian di Lingkungan Perguruan Tinggi Menggunakan Algoritma AES-256 dan SHA-256

Authors

  • Iwan Setiadi Universitas Gunadarma, Depok
  • Santi Widianti Universitas Gunadarma, Depok
  • I Putu Prachanda Kayuan Universitas Gunadarma, Depok

DOI:

https://doi.org/10.55606/juprit.v3i4.4569

Keywords:

Data, Exam questions, Cryptography, Algorithm

Abstract

This study discusses the implementation of cryptographic technology for securing exam questions in a college environment, focusing on the use of the AES-256 and SHA-256 algorithms. The purpose of this study is to protect exam questions from the threat of leaks and ensure the authenticity of the questions received by students. In the experimental method in the proposed scientific writing, exam questions will be encrypted using the AES-256 algorithm, while the SHA-256 algorithm is used to generate a unique hash value that maintains the integrity of the question data, where the hash itself is an alphanumeric code generated from the process of converting digital data through certain mathematical functions. The AES-256 and SHA-256 Cryptographic Algorithms are chosen as algorithms to secure exam questions, Oracle VM VirtualBox and Kali Linux as the types of software/operating systems chosen to run the AES-256 and SHA-256 cryptographic algorithms. expected with strong protection against the threat of data leaks and manipulation, and ensure that the exam questions received by students remain original and do not change and are maintained authenticity.

 

Downloads

Download data is not yet available.

References

ENKRIPSI DAN DEKRIPSI DENGAN ALGORITMA AES 256 UNTUK SEMUA JENIS FILE Voni Yuniati (1) , Gani Indriyanta(2), Antonius Rachmat C(3). Diakses tanggal 27 Agustus 2024 dari https://media.neliti.com/media/publications/65826-ID-enkripsi-dan-dekripsi-dengan-algoritma-a.pdf

Cara Kerja AES. Di akses tanggal juli 2024 dari https://www.youtube.com/watch?v=61GRG4YloqU&t=412s

AES Animation. Di akses tanggal juli 2024 dari https://formaestudio.com/rijndaelinspector/archivos/Rijndael_Animation_v4_eng-html5.html

Difference Between AES and SHA256 by Diptendu Das. Diakses tanggal 27 Agustus 2024 dari https://diptendud.medium.com/difference-between-aes-and-sha256-706d6b2eb2ef

Advanced Encryption Standard (AES) by cosinesix 2023. Diakses tanggal 27 Agustus 2024 dari https://medium.com/@marketing_14184/advanced-encryption-standard-aes-dfb758ecbfa0

Pengamanan Arsip dengan Algoritma Enkripsi AES-256 untuk Web App E-Arsip Yayasan Universitas Islam Sumatera Utara Ibnu Hajar Fakultas Teknik, Teknik Informatika, Universitas Islam Sumatera Utara, Medan, Indonesia. Diakses tanggal 27 Agustus 2024 dari https://jurnal.ilmubersama.com/index.php/hello_world/article/download/13/27/382

PENERAPAN ALGORITMA KRIPTOGRAFI AES 256 UNTUK MENGAMANKAN DOKUMEN BERBASIS WEB PADA KELURAHAN BELENDUNG Irfan Kurnia Nurhareza, Siswanto Siswanto Fakultas Teknologi Informasi, Teknik Informatika, Universitas Budi Luhur, Jakarta, Indonesia. Diakses tanggal 27 Agustus 2024 dari https://senafti.budiluhur.ac.id/index.php/senafti/article/download/269/35 atau https://senafti.budiluhur.ac.id/index.php/senafti/article/view/269

A High-Performance Multimem SHA-256 Accelerator for Society 5.0 THI HONG TRAN, HOAI LUAN PHAM, and YASUHIKO NAKASHIMA. Diakses tanggal 27 Agustus 2024 dari https://www.researchgate.net/publication/349744176_A_High-Performance_Multimem_SHA-256_Accelerator_for_Society_50

Pengertian dan Fungsi SHA-256 dalam Melindungi Bitcoin dan Transaksi Digital. Diakses tanggal 27 Agustus 2024 dari https://support.bittime.com/hc/id/articles/8986445893903-Pengertian-dan-Fungsi-SHA-256-dalam-Melindungi-Bitcoin-dan-Transaksi-Digital

Analysis of SHA-512/224 and SHA-512/256 Christoph Dobraunig, Maria Eichlseder, and Florian Mendel Graz University of Technology, Austria [email protected]. Diakses tanggal 27 Agustus 2024 dari https://eprint.iacr.org/2016/374.pdf

National Security Agency . Diakses tanggal 27 Agustus 2024 dari https://en.wikipedia.org/wiki/National_Security_Agency

Quantum Computing Challenge . Diakses tanggal 27 Agustus 2024 dari https://medium.com/@kootie73/sha-256-from-origins-to-the-quantum-computing-challenge-57dd145ee690

SHA256: The Most Used Hash Function in Cryptocurrencies . Diakses tanggal 27 Agustus 2024 dari https://www.nervos.org/knowledge-base/SHA256_most_used_hash_function_(explainCKBot)

SHA-256 | FULL Step-by-Step Explanation (With Examples). Di akses tanggal juli 2024 dari https://www.youtube.com/watch?v=orIgy2MjqrA&t=2s

A Definitive Guide to Learn The SHA-256 (Secure Hash Algorithms) Lesson 10 of 64 By Baivab Kumar Jena. Diakses tanggal 27 Agustus 2024 dari https://www.simplilearn.com/tutorials/cyber-security-tutorial/sha-256-algorithm

What Is the SHA-256 Algorithm & How It Works Last updated on August 5th, 2024 by Dionisie Gitlan. Diakses tanggal 27 Agustus 2024 dari https://www.ssldragon.com/blog/sha-256-algorithm/

FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS). Diakses tanggal 28 Agustus 2024 dari https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf

Let’s dive in to the world of Virtualization by Tony Alosius, 2023. . Diakses tanggal 27 Agustus 2024 dari https://medium.com/@tony.aloysius.77/step-by-step-guide-to-installing-oracle-virtualbox-a-beginners-tutorial-eba18cfe6d2d

What is Kali Linux and How to Get Started? A Comprehensive Guide by The Intect, 2024. Diakses tanggal 27 https://medium.com/@info_82002/what-is-kali-linux-and-how-to-get-started-a-comprehensive-guide-ef97567375fe

Soal ujian yang di gunakan sebagai contoh data pengimplemantasian . Diakses tanggal 29 Agustus 2024 dari http://heliany.staff.gunadarma.ac.id/Downloads/files/38724/soal+uts+PKN.docx

AES-256 yang digunakan sebgai software tambahan, diunduh tanggal 27 agustus https://github.com/topics/crypter

Downloads

Published

2024-12-02

How to Cite

Iwan Setiadi, Santi Widianti, & I Putu Prachanda Kayuan. (2024). Implementasi Kriptografi Pengamanan Data Soal Ujian di Lingkungan Perguruan Tinggi Menggunakan Algoritma AES-256 dan SHA-256. Jurnal Penelitian Rumpun Ilmu Teknik, 3(4), 153–178. https://doi.org/10.55606/juprit.v3i4.4569