Implementasi Algoritma Sprizt Untuk Mengamankan Database Aplikasi Ujian Semester Berbasis Komputer
DOI:
https://doi.org/10.64366/adajisr.v1i2.36Keywords:
Exams; Computer Based; Cryptography; SpritzAbstract
With the rise of schools conducting computer-based exams, many web-based exam applications have sprung up and can be used free of charge, especially at SMK Alwashliyah Pasar Senen 2 Medan. However, the weakness of the computer-based exam is that there is no security for questions that are stored in the database, of course the questions are confidential data and must be safe. Therefore we need a database security technique to keep the question secret, whether an attack occurs or not. The technique used is cryptographic encryption techniques. This study encrypts the database of computer-based exam questions with the Spritz algorithm. In securing the database of exam questions using cryptographic techniques, the meaning of the questions in the database cannot be understood, so that in the event of an attack, the questions cannot be read and understood by the attacking party, thereby eliminating the level of cheating during the exam. The encryption process is carried out when the admin inputs a question on the admin exam web interface. Meanwhile, the decryption stage is carried out when students carry out a computer-based exam. Based on the manual encryption process on the sample database with the plaintext "Inventor", a new character value is obtained which is called the ciphertext, namely rz¸ñjJ.
Downloads
References
N. W. Hidayatulloh, M. Tahir, H. Amalia, N. A. Basyar, A. F. Prianggara, and M. Yasin, “Mengenal Advance Encryption Standard (AES) sebagai Algoritma Kriptografi dalam Mengamankan Data,” Digit. Transform. Technol., vol. 3, no. 1, pp. 1–10, 2023.
S. Oktaviani, F. Rizky, and I. Gunawan, “Analisis Keamanan Data Dengan Menggunakan Kriptografi Modern Algoritma Advance Encryption Standar (AES),” J. Media Inform., vol. 4, no. 2, pp. 97–101, 2023.
K. Andrea, A. Wardana, B. S. Wanandi, and A. Ikhwan, “Penerapan Kriptografi Caesar Cipher Pada Fitur Aplikasi Chatting Whatsapp,” J. Penelit. Dan Pengkaj. Ilm. Eksakta, vol. 2, no. 1, pp. 6–11, 2023.
M. Wasil, “Implementasi Matriks Dalam Kriptografi Hill Cipher Dalam Mengamankan Pesan Rahasia,” Zeta-Math J., vol. 8, no. 2, pp. 71–78, 2023.
M. Hidayat, M. Tahir, A. Sukriyadi, and A. Sulton, “PENERAPAN KRIPTOGRAFI CAESAR CHIPER DALAM PENGAMANAN DATA,” J. Ilm. Multidisiplin, vol. 2, no. 03, pp. 35–41, 2023.
C. H. Harianja, “Analisis Algoritma Spritz dan Algoritma Goldbach G0 Codes pada Pengamanan Pesan Teks.” Universitas Sumatera Utara, 2021.
S. Kabeaken and I. Saputra, “Perancangan Aplikasi Enkripsi Pada File Teks Menggunakan Algoritma Spritz,” JURIKOM (Jurnal Ris. Komputer), vol. 7, no. 3, pp. 353–357, 2020.
I. Z. H. Nasution, “Sistem Keamanan Citra Digital Menggunakan Algoritma Spritz.” Universitas Islam Negeri Sumatera Utara, 2020.
T. Harumy, “Implementasi Algoritma Knapsack dan Algoritma Spritz dalam Mengamankan File.” Universitas Sumatera Utara, 2021.
W. A. Prabowo, M. Mesran, and S. N. Hutagalung, “Perancangan Aplikasi Penyandian Pesan Chat Client dan Server Berdasarkan Algoritma Spritz,” JURIKOM (Jurnal Ris. Komputer), vol. 7, no. 3, pp. 358–364, 2020.
D. Anggara, “Perancangan Aplikasi Enkripsi Pada File Suara Menggunakan Algoritma Spritz,” vol. 1, no. 3, pp. 103–108, 2020.
K. Ndr, “IMPLEMENTASI ALGORITME KRIPTOGRAFI ADVANCED ENCRYPTION STANDARD ( AES-256 ) UNTUK MENGAMANKAN IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD CRYPTOGRAPHIC ALGORITHM ( AES-256 ) TO SECURE EMPLOYEE ASSESSMENT DATABASE AT KJPP NDR,” vol. 20, no. 1, pp. 44–49, 2023.
L. Belakang, “Metode algoritma rc4 (rivest code 4) untuk pengamanan database transaksi pada glory digital sablon,” vol. 13, no. 1, 2023.
M. A. A. Widodo, M. Thasandra, S. O. Sutra, A. B. Nasution, and A. Ikhwan, “Pemanfaatan Kriptografi dalam Mewujudkan Keamanan Informasi pada E-Voting di Kota Medan dengan Menggunakan Algoritma AES,” J. Educ., vol. 5, no. 3, pp. 6780–6787, 2023.
D. I. G. Hutasuhut, M. R. Aldizar, I. F. Nasution, and M. F. Nasution, “Perbandingan Algoritma Kriptografi Simetris dan Asimetris,” UNES J. Inf. Syst., vol. 8, no. 1, pp. 42–47, 2023.
A. P. R. Tarigan, P. S. Ramadhan, and K. Ibnutama, “Penerapan Kriptografi Untuk Pengamanan Data Penjualan Sepatu Dengan Metode AES (Advanced Encryption Standard),” J. Cyber Tech, vol. 5, no. 1, pp. 26–35, 2023.
M. S. D. Dairi and M. S. Asih, “Implementasi Algoritma Kriptografi RSA Dalam Aplikasi Sistem Informasi Perpustakaaan,” J. Ilmu Komput. dan Sist. Inf., vol. 2, no. 1, pp. 214–223, 2023.
F. A. Sya‘bani, “Hardening Sistem Informasi Sekawan V2 menggunakan Framework Owasp.” Universitas Islam Indonesia, 2023.
I. Mahgafhira, A. Wahid, and J. M. Parenreng, “Pengembangan Sistem Otentikasi Dokumen Digital Jurusan Teknik Informatika Dan Komputer Fakultas Teknik UNM Berbasis Digital Signature,” Progress. Information, Secur. Comput. Embed. Syst., vol. 1, no. 2, pp. 115–125, 2023.
I. Rahim, N. Anwar, A. M. Widodo, K. K. Juman, and I. Setiawan, “Komparasi Fungsi Hash Md5 Dan Sha256 Dalam Keamanan Gambar Dan Teks,” IKRA-ITH Inform. J. Komput. dan Inform., vol. 7, no. 2, 2023.
T. A. Irvida, “Implementasi Algoritma Spritz dan Algoritma Kunci Publik Rabin-p dengan Skema Hybrid Cryptosystem pada Pengamanan Teks.” Universitas Sumatera Utara, 2020.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma Sprizt Untuk Mengamankan Database Aplikasi Ujian Semester Berbasis Komputer
ARTICLE HISTORY
How to Cite
Issue
Section
Copyright (c) 2024 Magresi Manalu

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






