Learning Text Data Security in Documents Using McEliece's Algorithm

  • Sinar Sinurat Universitas Budi Darma
  • Edward R Siagian Universitas Budi Darma
Keywords: Computer¬_Assisted_Instruction, Tutorial, Learning, Cryptography, McEliece, Decryption, Encryption.

Abstract

        Computer Assisted Instruction (CAI) is a very interesting computer-based learning media and is able to increase students' learning motivation. One model of CAI is a tutorial in which the delivery of material is carried out in a tutorial manner, as a tutorial is done by a teacher or instructor. The development of this design idea is based on how to design learning software for the McEliece cryptographic algorithm using the Computer Assisted Instruction (CAI) tutorial model by displaying the key formation process, the encryption process and the decryption process in the McEliece cryptographic algorithm, and including the McEliece cryptographic algorithm as material in learning applications. . The results of this study show that the McEliece cryptographic algorithm learning software is designed using the Computer Assisted Instruction (CAI) tutorial model and is useful for showing every step and result of the key formation process, the encryption process and the decryption process contained in the McEliece cryptographic algorithm, so that can help understand or learn work procedures or algorithms from the cryptography.

Downloads

Download data is not yet available.

References

[1] R. Wondal, “Pengaruh Media Pembelajaran Computer Assisted Instruction (Cai) Terhadap Hasil Belajar Siswa,” Bioedukasi Univ. Khairun, vol. 3, no. 2, pp. 360–366, 2015.
[2] E. Persichetti, “On the CCA2 security of McEliece in the standard model,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11192 LNCS, pp. 165–181, 2018, doi: 10.1007/978-3-030-01446-9_10.
[3] A. Muhson, “Pengembangan Media Pembelajaran Berbasis Teknologi Informasi,” J. Pendidik. Akunt. Indones., vol. 8, no. 2, 2010, doi: 10.21831/jpai.v8i2.949.
[4] D. Anggoro et al., “Abstrak Pendahuluan Studi Terkait,” vol. 7, no. 1, pp. 2343–2386, 2020.
[5] A. Wahyuni, “Aplikasi Kriptosistem dengan Algoritma Mc Elliece,” pp. 1–7.
[6] N. F. Ilmiyah, “Kajian Tentang Kriptosistem Mceliece Dalam Menghadapi Tantangan Komputer Kuantum Di Era Revolusi Industri 4.0,” Pros. Semin. Nas. MIPA Kolaborasi, pp. 216–226, 2019.
[7] J. Freudenberger and J. P. Thiers, “A new class of q-ary codes for the mceliece cryptosystem,” Cryptography, vol. 5, no. 1, 2021, doi: 10.3390/cryptography5010011.
[8] M. Repka, “Mceliece pkc calculator,” J. Electr. Eng., vol. 65, no. 6, pp. 342–348, 2014, doi: 10.2478/jee-2014-0056.
[9] N. M. Dwijayani, “Development of circle learning media to improve student learning outcomes,” J. Phys. Conf. Ser., vol. 1321, no. 2, pp. 171–187, 2019, doi: 10.1088/1742-6596/1321/2/022099.
[10] S. Samsudin, “Aplikasi Computer Aided Instruction (Cai) Dalam Pembelajaran Matematika Bangun Ruang,” J. Tek. Inform., vol. 10, no. 2, pp. 169–182, 2018, doi: 10.15408/jti.v10i2.6995.
[11] D. Riastuti, “Pengembangan Computer Assisted Intruction Untuk Pembelajaran Matematika,” Penelitian Dan Evaluasi Pendidikan, vol. 1. p. 72, 2006.
[12] M. Baldi, M. Bianchi, F. Chiaraluce, J. Rosenthal, and D. Schipani, “Enhanced Public Key Security for the McEliece Cryptosystem,” J. Cryptol., vol. 29, no. 1, pp. 1–27, 2016, doi: 10.1007/s00145-014-9187-8.
[13] M. Safii and V. Vidy, “Kriptografi Monoalfabetik Dan Polialfabetik Aplikasi Dan Komparasi Dalam Pengamanan Database Bank Soal,” Sebatik, vol. 22, no. 1, pp. 1–9, 2018, doi: 10.46984/sebatik.v22i1.203.
[14] R. Boestari and L. Z. Tomarere, “McEliece As An Alternative Cryptosystem,” no. 13502016, pp. 3–6, 1978.
[15] R. Toyib and Y. Darnita, “Pengamanan Data Teks Dengan Menggunakan Algoritma Zero-Knowledge Proof,” J. Media Infotama, vol. 16, no. 1, pp. 16–23, 2020, doi: 10.37676/jmi.v16i1.1114.
[16] M. Y. Soleh and S. Teknik, “Studi dan Implementasi Algoritma Keccak,” 2011.
[17] E. Persichetti, “Compact McEliece keys based on quasi-dyadic Srivastava codes,” J. Math. Cryptol., vol. 6, no. 2, pp. 149–169, 2012, doi: 10.1515/jmc-2011-0099.
[18] Z. Naseer and S. Albermany, “McEliece in RADG using Diffie–Hellman Security System,” no. May 2018, 2019.
Published
2022-12-08
How to Cite
Sinar Sinurat, & Edward R Siagian. (2022). Learning Text Data Security in Documents Using McEliece’s Algorithm. INFOKUM, 10(5), 323-330. Retrieved from http://seaninstitute.org/infor/index.php/infokum/article/view/927