Encoding the Record Database of Computer Based Test Exam Based on Spritz Algorithm

Main Article Content

Taronisokhi Zebua

Abstract

Computer utilization in the execution of the computer-based test is currently no strange. Almost all government agencies and companies at the time of conducting the test acceptance of new employees have been using computer-based test system online or often referred to as Computer Based Test (CBT). One of the important aspects to be considered and must be maintained in the execution of computer-based exams is the problem of question security and exam answers to abuse actions. One technique that can be done to solve the problems above is the use of cryptographic techniques. This research describes the use of spritz algorithm which is one of the cryptographic algorithms to encode the text database record of the computer-based test. The results of the encoding process can make it harder for the attackers to know the original text of the exam, so as to minimize the abuse of the exam.

Downloads

Download data is not yet available.

Article Details

How to Cite
ZEBUA, Taronisokhi. Encoding the Record Database of Computer Based Test Exam Based on Spritz Algorithm. Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, [S.l.], p. 52-62, may 2018. ISSN 2541-5832. Available at: <https://ojs.unud.ac.id/index.php/lontar/article/view/36915>. Date accessed: 11 nov. 2019. doi: https://doi.org/10.24843/LKJITI.2018.v09.i01.p06.
Section
Articles

References

[1] A. Hangga and E. Prabowo, “Modifikasi Linear Congruential Generator untuk Sistem Pengacakan Soal pada Computer Based Test (CBT),” Jurnal Teknik Elektro, vol. 8, no. 2, pp. 47–49, 2016.
[2] E. Setyaningsih, “Penyandian Citra Menggunakan Metode Playfair Cipher,” Jurnal Teknologi, vol. 2, no. 2, pp. 213–219, 2009.
[3] T. Zebua and E. Ndruru, “Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4,” J. Teknol. Infomasi dan Ilmu Komput., vol. 4, no. 4, pp. 275–282, 2017.
[4] S. Banik and T. Isobe, “Cryptanalysis of the full Spritz stream cipher,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, vol. 9783, pp. 63–77.
[5] R.G. Jimoh,“Students' Perception of Computer Based Test (CBT) for Examining Undergraduate Chemistry Courses”, Journal of Emerging Trends in Computing and Information Sciences, vol. 3, no. 2, pp. 125-134.
[6] Susanto, “Implementasi Keamanan Data Sistem Informasi Inventory Stock Barang PT. Wings Food Menggunakan Algoritma Riverst Code 4 (RC4),” Lontar Komputer: Jurnal Ilmiah Teknologi Informasi, vol. 8, no. 2, pp. 77–88, 2017.
[7] T. Zebua, “Analisa dan Implementasi Algoritma Triangle Chain Pada Penyandian Record Database,” Jurnal Pelita Informatika, vol. 3, no. 2, pp. 37–49, 2013.
[8] R. L. Rivest and J. C. N. Schuldt, “Spritz — a spongy RC4-like stream cipher and hash function,” in CRYPTO 2014 Rump Session, 2014, pp. 1–30.
[9] T. Zebua, “Penerapan Metode LSB-2 Untuk Menyembunyikan Ciphertext Pada Citra Digital,” Jurnal Pelita Informatika, vol. 10, no. 3, pp. 135–140, 2015.
[10] E. Setyaningsih, “Kriptografi dan Implementasi Menggunakan Matlab,” Yogyakarta: Andi, 2015.