Main Article Content
Computer utilization in the execution of the computer-based test is currently no strange. Almost all government agencies and companies at the time of conducting the test acceptance of new employees have been using computer-based test system online or often referred to as Computer Based Test (CBT). One of the important aspects to be considered and must be maintained in the execution of computer-based exams is the problem of question security and exam answers to abuse actions. One technique that can be done to solve the problems above is the use of cryptographic techniques. This research describes the use of spritz algorithm which is one of the cryptographic algorithms to encode the text database record of the computer-based test. The results of the encoding process can make it harder for the attackers to know the original text of the exam, so as to minimize the abuse of the exam.
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to Jurnal Lontar Komputer as publisher of the journal. Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, as well as translations. The reproduction of any part of this journal (printed or online) will be allowed only with a written permission from Jurnal Lontar Komputer. The Editorial Board of Jurnal Lontar Komputer make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal.
This work is licensed under a Creative Commons Attribution 4.0 International License.
 E. Setyaningsih, “Penyandian Citra Menggunakan Metode Playfair Cipher,” Jurnal Teknologi, vol. 2, no. 2, pp. 213–219, 2009.
 T. Zebua and E. Ndruru, “Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4,” J. Teknol. Infomasi dan Ilmu Komput., vol. 4, no. 4, pp. 275–282, 2017.
 S. Banik and T. Isobe, “Cryptanalysis of the full Spritz stream cipher,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, vol. 9783, pp. 63–77.
 R.G. Jimoh,“Students' Perception of Computer Based Test (CBT) for Examining Undergraduate Chemistry Courses”, Journal of Emerging Trends in Computing and Information Sciences, vol. 3, no. 2, pp. 125-134.
 Susanto, “Implementasi Keamanan Data Sistem Informasi Inventory Stock Barang PT. Wings Food Menggunakan Algoritma Riverst Code 4 (RC4),” Lontar Komputer: Jurnal Ilmiah Teknologi Informasi, vol. 8, no. 2, pp. 77–88, 2017.
 T. Zebua, “Analisa dan Implementasi Algoritma Triangle Chain Pada Penyandian Record Database,” Jurnal Pelita Informatika, vol. 3, no. 2, pp. 37–49, 2013.
 R. L. Rivest and J. C. N. Schuldt, “Spritz — a spongy RC4-like stream cipher and hash function,” in CRYPTO 2014 Rump Session, 2014, pp. 1–30.
 T. Zebua, “Penerapan Metode LSB-2 Untuk Menyembunyikan Ciphertext Pada Citra Digital,” Jurnal Pelita Informatika, vol. 10, no. 3, pp. 135–140, 2015.
 E. Setyaningsih, “Kriptografi dan Implementasi Menggunakan Matlab,” Yogyakarta: Andi, 2015.