This study aims to cover the shortcomings of the one-time pad algorithm used in the Shamir’s three-pass protocol scheme. In this study, the technique used to cover the weakness of one-time pad algorithm is by changing each ciphertext generated from the three paths in the three pass protocol scheme. Ciphertext modification is performed by encrypting the cipher-text by using the RSA and Elgamal algorithms to generate super ciphertext. The first line and the third line are encrypted by using the RSA algorithm and the second line is using ElGamal algorithm. Both algorithms are aimed at keeping no secret key exchange which is a major requirement of the three pass protocol scheme. The evaluation results show that the weakness of one-time pad algorithm can be overcome. Although the processing time of three pass protocol increases, but the longer the plaintext character the closer the processing time ratio to one. The research showsThe only way for plaintext to be formed by cryptoanalysis is they must succeed to decrypt the three super ciphertexts back into the three initial ciphertexts first. But it is not easy if RSA and ElGamal algorithms use the big prime number.
Tujuan dari penelitian ini adalah mengombinasikan algoritma kunci publik Elgamal dengan model operasi Electronic Code Book (ECB) untuk menghasilkan algoritma yang cepat dan aman yang terbebas dari masalah key distribution. Masalah key distribution terjadi dikarenakan adanya proses pengiriman kunci rahasia dalam jaringan publik. Model operasi Electronic Code Book (ECB) digunakan untuk proses enkripsi dengan panjang blok 128-bit. Algoritma Elgamal digunakan untuk mengenkripsi kunci simetris 128-bit yang berbentuk acak untuk menghasilkan cipher key yang bersifat publik atau tidak rahasia. Hasil penelitian menunjukkan masalah key distribution berhasil teratasi. Cipher text yang dihasilkan sangat kuat karena terdapat 2128 kombinasi acak dari cipher text per blok dan 2128 kombinasi kunci acak yang mungkin. Waktu proses dekripsi lebih cepat dari pada waktu proses enkripsi. Waktu proses enkripsi dan dekripsi sangat cepat sehingga cocok digunakan untuk mengenkripsi dan mendekripsi data yang berukuran besar. Sifat kunci yang acak sepanjang 128-bit dan terenkripsi dengan algoritma Elgamal membuat kunci sulit untuk dipecahkan.
Desa Lau Gumba merupakan Desa yang terletak di Kecamatan Brastagi Kabupaten Karo Provinsi Sumatera Utara yang cukup di kenal karena memiliki objek wisata yang cukup menarik untuk dikunjungi. Sebuah desa yang menyajikan lokasi objek wisata di Desa tersebut menampilkan pesona alam yang cukup menakjubkan untuk para wisatawan local maupun mancanegara. Desa Lau Gumba memiliki banyak tempat lokasi perkebunan berbagai jenis buah-buahan yang ditanam petani desa tersebut, hal ini yang menjadikan daya tarik objek wisata yang cukup baik dan menyehatkan untuk wisatawan. Desa Lau Gumba memiliki hasil pertanian buah buahan dengan berbagai macam buah yang baik, dengan penting nya memperhatikan kualitas dan jenis vitamin, karena Ketika masyarakat menjual atau pun konsumsi buah berdasarkan kadar vitamin merupakan hal yang sangat penting memperhatikan bentuk kesegaran warna buah yang dikonsumsi. Namun Hal ini dibutuhkan teknologi yang dapat menyajikan informasi pengelompokkan buah berdasarkan kadar vitamin. Seperti hal dengan informasi yang memberi penjelasan dalam informasi dalam pengelompokkan buah berdasarkan kadar vitamin harus meliputi data data yang benar. Metode yang di pakai dalam peneltian ini dengan menggunakan UML (Unifed Modeling Language) yaitu menggunakan metode k-medoids, pemograman web, mysql sebagai penyimpanan data. Dengan penerapan informasi teknologi akan berdampak pada pengelompokkan buah berdasarkan kadar vitamin, sehingga petani dapat dengan mudah mengelompokkan buah buah hasil panen berdasarkan kadar vitamin yang dihasilkan.
This investigation was conducted to move forward the security of the vigenère cypher calculation by tending to the key conveyance issue and the most key issue within the calculation if cryptoanalysts effectively got it. The working demonstrates employments a 512-bit Electronic Code Book (ECB). The essential key utilized was a 512-bit arbitrary key. The randomized encoding table was also generated by the Blum Blum Shub calculation employing a scrambler key. The RSA calculation was utilized to scramble 512-bits random keys and scrambler keys. It comes about to appear that the proposed calculation does not include a key dissemination issue. With a randomized encoding table, the 512-bits arbitrary key cannot be utilized to unscramble the ciphertext off chance that cryptanalysis did not know the mixed table utilized. The preparing time appeared the proportion of the contrast of the vigenère cypher calculation. The proposed calculation was not as well essentially distinctive, and the longer the message was handled, the proportion of the time distinction possessed was moreover getting closer to one, which implies the distinction was not critical. The coming about ciphertext was too exceptionally secure, where the coming about ciphertext was irregular since the key utilized was random, and there were 3.75 x 10126 keys combination. This algorithm can be an alternative algorithm that is fast, safe, and easy to implement
This research was conducted to implement the Bayes algorithm in an expert system to diagnose types of diseases in cassava plants. The research data was taken from the Binjai City Agriculture and Fisheries Office in 2018. The expert system was built based on the web, where the application was built using the PHP programming language and MySQL DBMS. The results showed that the Bayes algorithm can be used in expert system applications to diagnose types of cassava plant diseases. In the Bayes algorithm, the knowledge base is taken from the data of the amount of data from cassava plants that suffer from disease, so the results of diagnosing cassava plants are based on existing data. Therefore, the more patient data that is used as a knowledge base, the better the diagnosis results are given.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.