Implementasi Kriptografi Pengamanan Data Soal Ujian di Lingkungan Perguruan Tinggi Menggunakan Algoritma AES-256 dan SHA-256
DOI:
https://doi.org/10.55606/juprit.v3i4.4569Keywords:
Data, Exam questions, Cryptography, AlgorithmAbstract
This study discusses the implementation of cryptographic technology for securing exam questions in a college environment, focusing on the use of the AES-256 and SHA-256 algorithms. The purpose of this study is to protect exam questions from the threat of leaks and ensure the authenticity of the questions received by students. In the experimental method in the proposed scientific writing, exam questions will be encrypted using the AES-256 algorithm, while the SHA-256 algorithm is used to generate a unique hash value that maintains the integrity of the question data, where the hash itself is an alphanumeric code generated from the process of converting digital data through certain mathematical functions. The AES-256 and SHA-256 Cryptographic Algorithms are chosen as algorithms to secure exam questions, Oracle VM VirtualBox and Kali Linux as the types of software/operating systems chosen to run the AES-256 and SHA-256 cryptographic algorithms. expected with strong protection against the threat of data leaks and manipulation, and ensure that the exam questions received by students remain original and do not change and are maintained authenticity.
Downloads
References
ENKRIPSI DAN DEKRIPSI DENGAN ALGORITMA AES 256 UNTUK SEMUA JENIS FILE Voni Yuniati (1) , Gani Indriyanta(2), Antonius Rachmat C(3). Diakses tanggal 27 Agustus 2024 dari https://media.neliti.com/media/publications/65826-ID-enkripsi-dan-dekripsi-dengan-algoritma-a.pdf
Cara Kerja AES. Di akses tanggal juli 2024 dari https://www.youtube.com/watch?v=61GRG4YloqU&t=412s
AES Animation. Di akses tanggal juli 2024 dari https://formaestudio.com/rijndaelinspector/archivos/Rijndael_Animation_v4_eng-html5.html
Difference Between AES and SHA256 by Diptendu Das. Diakses tanggal 27 Agustus 2024 dari https://diptendud.medium.com/difference-between-aes-and-sha256-706d6b2eb2ef
Advanced Encryption Standard (AES) by cosinesix 2023. Diakses tanggal 27 Agustus 2024 dari https://medium.com/@marketing_14184/advanced-encryption-standard-aes-dfb758ecbfa0
Pengamanan Arsip dengan Algoritma Enkripsi AES-256 untuk Web App E-Arsip Yayasan Universitas Islam Sumatera Utara Ibnu Hajar Fakultas Teknik, Teknik Informatika, Universitas Islam Sumatera Utara, Medan, Indonesia. Diakses tanggal 27 Agustus 2024 dari https://jurnal.ilmubersama.com/index.php/hello_world/article/download/13/27/382
PENERAPAN ALGORITMA KRIPTOGRAFI AES 256 UNTUK MENGAMANKAN DOKUMEN BERBASIS WEB PADA KELURAHAN BELENDUNG Irfan Kurnia Nurhareza, Siswanto Siswanto Fakultas Teknologi Informasi, Teknik Informatika, Universitas Budi Luhur, Jakarta, Indonesia. Diakses tanggal 27 Agustus 2024 dari https://senafti.budiluhur.ac.id/index.php/senafti/article/download/269/35 atau https://senafti.budiluhur.ac.id/index.php/senafti/article/view/269
A High-Performance Multimem SHA-256 Accelerator for Society 5.0 THI HONG TRAN, HOAI LUAN PHAM, and YASUHIKO NAKASHIMA. Diakses tanggal 27 Agustus 2024 dari https://www.researchgate.net/publication/349744176_A_High-Performance_Multimem_SHA-256_Accelerator_for_Society_50
Pengertian dan Fungsi SHA-256 dalam Melindungi Bitcoin dan Transaksi Digital. Diakses tanggal 27 Agustus 2024 dari https://support.bittime.com/hc/id/articles/8986445893903-Pengertian-dan-Fungsi-SHA-256-dalam-Melindungi-Bitcoin-dan-Transaksi-Digital
Analysis of SHA-512/224 and SHA-512/256 Christoph Dobraunig, Maria Eichlseder, and Florian Mendel Graz University of Technology, Austria [email protected]. Diakses tanggal 27 Agustus 2024 dari https://eprint.iacr.org/2016/374.pdf
National Security Agency . Diakses tanggal 27 Agustus 2024 dari https://en.wikipedia.org/wiki/National_Security_Agency
Quantum Computing Challenge . Diakses tanggal 27 Agustus 2024 dari https://medium.com/@kootie73/sha-256-from-origins-to-the-quantum-computing-challenge-57dd145ee690
SHA256: The Most Used Hash Function in Cryptocurrencies . Diakses tanggal 27 Agustus 2024 dari https://www.nervos.org/knowledge-base/SHA256_most_used_hash_function_(explainCKBot)
SHA-256 | FULL Step-by-Step Explanation (With Examples). Di akses tanggal juli 2024 dari https://www.youtube.com/watch?v=orIgy2MjqrA&t=2s
A Definitive Guide to Learn The SHA-256 (Secure Hash Algorithms) Lesson 10 of 64 By Baivab Kumar Jena. Diakses tanggal 27 Agustus 2024 dari https://www.simplilearn.com/tutorials/cyber-security-tutorial/sha-256-algorithm
What Is the SHA-256 Algorithm & How It Works Last updated on August 5th, 2024 by Dionisie Gitlan. Diakses tanggal 27 Agustus 2024 dari https://www.ssldragon.com/blog/sha-256-algorithm/
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS). Diakses tanggal 28 Agustus 2024 dari https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf
Let’s dive in to the world of Virtualization by Tony Alosius, 2023. . Diakses tanggal 27 Agustus 2024 dari https://medium.com/@tony.aloysius.77/step-by-step-guide-to-installing-oracle-virtualbox-a-beginners-tutorial-eba18cfe6d2d
What is Kali Linux and How to Get Started? A Comprehensive Guide by The Intect, 2024. Diakses tanggal 27 https://medium.com/@info_82002/what-is-kali-linux-and-how-to-get-started-a-comprehensive-guide-ef97567375fe
Soal ujian yang di gunakan sebagai contoh data pengimplemantasian . Diakses tanggal 29 Agustus 2024 dari http://heliany.staff.gunadarma.ac.id/Downloads/files/38724/soal+uts+PKN.docx
AES-256 yang digunakan sebgai software tambahan, diunduh tanggal 27 agustus https://github.com/topics/crypter
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Jurnal Penelitian Rumpun Ilmu Teknik

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.