CFP last date
20 February 2025
Reseach Article

Mobile-based Learning Application for Enhancing Understanding of Cipher Feedback Algorithms

by Amar Al Fatah, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 40
Year of Publication: 2024
Authors: Amar Al Fatah, Imam Riadi
10.5120/ijca2024923992

Amar Al Fatah, Imam Riadi . Mobile-based Learning Application for Enhancing Understanding of Cipher Feedback Algorithms. International Journal of Computer Applications. 186, 40 ( Sep 2024), 26-33. DOI=10.5120/ijca2024923992

@article{ 10.5120/ijca2024923992,
author = { Amar Al Fatah, Imam Riadi },
title = { Mobile-based Learning Application for Enhancing Understanding of Cipher Feedback Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2024 },
volume = { 186 },
number = { 40 },
month = { Sep },
year = { 2024 },
issn = { 0975-8887 },
pages = { 26-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number40/mobile-based-learning-application-for-enhancing-understanding-of-cipher-feedback-algorithms/ },
doi = { 10.5120/ijca2024923992 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-09-27T00:46:19.261306+05:30
%A Amar Al Fatah
%A Imam Riadi
%T Mobile-based Learning Application for Enhancing Understanding of Cipher Feedback Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 40
%P 26-33
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

At the Information Technology Study Program of Universitas Ahmad Dahlan, Yogyakarta, cryptography is a core subject in the computer security course. Due to limited lecture time, cryptographic algorithms such as Cipher Feedback cannot be discussed in depth. This research aims to develop an Android application focused on the Cipher Feedback algorithm. The development process involves collecting data from Android-using students, literature study, observing cryptographic programs, and designing and implementing the application using Kotlin. The application is tested using Black Box Testing and the System Usability Scale to ensure its functionality. The results are expected to help students understand encryption and decryption using the Cipher Feedback algorithm.

References
  1. S. Sadya, ‘Pengguna Smartphone Indonesia Terbesar Keempat Dunia pada 2022’. Available: https://dataindonesia.id/digital/detail/pengguna-smartphone-indonesia-terbesar-keempat-dunia-pada-2022
  2. R. Mustajab, ‘8 Negara dengan Unduhan Aplikasi Terbanyak 2022, Ada Indonesia’ Jul. 22, 2024. Available: https://dataindonesia.id/internet/detail/8-negara-dengan-unduhan-aplikasi-terbanyak-2022-ada-indonesia.
  3. R. Mustajab, ‘Durasi Bermain Aplikasi Mobile di Indonesia Meningkat pada 2022’ Jul. 22, 2023. [Online]. Available: https://dataindonesia.id/digital/detail/durasi-bermain-aplikasi-mobile-di-indonesia-meningkat-pada-2022
  4. D. H. Jayani, ‘Pencurian Data Pribadi Makin Marak Kala Pandemi’, databoks.katadata.co.id. [Online]. Available: https://databoks.katadata.co.id/datapublish/2021/09/07/pencurian-data-pribadi-makin-marak-kala-pandemi
  5. M. Awad, M. Ali, M. Takruri, and S. Ismail, ‘Security vulnerabilities related to web-based data’, Telkomnika (Telecommunication Computing Electronics and Control), vol. 17, no. 2, pp. 852–856, 2019, doi: 10.12928/Telkomnika.v17i2.10484.
  6. P. Kriptografi and I. Rinaldi Munir, ‘Pengantar Kriptografi’, 2004.
  7. R. Umar, A. Yudhana, and A. Dahlan, ‘Analisis Sistem Keamanan Teknik Kriptografi dan Steganografi pada Citra Digital (Bitmap)’, 2019.
  8. I. Riadi, A. Fadil, and F. A. Tsani, ‘Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher’.
  9. S. A. Widiana and I. Firdaus, ‘Implementasi Enkripsi untuk Keamanan SMS Menggunakan Metode Cipher Feedback (CFB) 8-Bit Berbasis Android’, Journal of Informatics and Computing, vol. 2, no. 1, pp. 39–47, 2023.
  10. Ayushi, ‘A Symmetric Key Cryptographic Algorithm’, Int J Comput Appl, 2010.
  11. H. Hendy and H. Akbar, ‘Pengembangan Aplikasi Android Belajar Kriptografi Sebagai Media Pembelajaran Mata Kuliah Kriptografi’, Jurnal Informatika, vol. 8, no. 1, pp. 17–25, 2021, doi: 10.31294/ji.v8i1.9420.
  12. H. D. Hutahaean and P. M. Hasugian, ‘Aplikasi Pembelajaran Kriptograpi berbasis Mobile menggunakan Computer Assisted Instruction’, Media Informasi Analisa dan Sistem, vol. 4, no. 1, pp. 1–4, 2019, doi: 10.54367/means.v4i1.310.
  13. S. Hajar, ‘Perancangan Perangkat Lunak Pembelajaran Pemahaman Algoritma Electronic Code Book Menggunakan Metode Computer Assisted Instruction’, Kakifikom, vol. 01, pp. 14–22, 2019, [Online]. Available: https://core.ac.uk/download/pdf/287200775.pdf
  14. S. Budidarma, J. Sisingamangaraja, N. 338 Simpang, and L. Medan, ‘Perancangan Aplikasi Pembelajaran Kriptografi pada Algoritma Data Encryption System (DES) Menggunakan Metode Computer Assisted Instruction oleh Riska Oktaria’, Jurnal Teknik Informatika Kaputama (JTIK), vol. 3, no. 2, 2019, [Online]. Available: www.stmik-budidarma.ac.id//
  15. M. F. Dalimuthe, ‘Perancangan Aplikasi Pengamanan File Dokumen Teks Dengan Menggunakan Algoritma Cipher Feedback’, Jurnal Teknik Informatika UNIKA Santo Thomas, vol. 04, pp. 70–75, 2019, [Online].
  16. S. Saleh, S. Pd, and M. Pd, ‘Analisis Data Kualitatif’.
  17. M. Badrul, ‘Penerapan Metode Waterfall Untuk Perancangan Sistem Informasi Inventory Pada Toko Keramik Bintang Terang’, vol. 8, no. 2, 2021.
  18. M. Alda, I. Saputri, H. Kurniawan Matanari, and F. Mahmudah, ‘Perancangan Aplikasi Media Pembelajaran TIK Menggunakan Metode Waterfall Berbasis Mobile’.
  19. A. Abdul Wahid Sekolah Tinggi Manajemen Informatika dan Komputer Sumedang, ‘Analisis Metode Waterfall Untuk Pengembangan Sistem Informasi’. [Online]. Available: https://www.researchgate.net/publication/346397070
  20. S. M. Anouncia, M. Cherian, A. Parija, and D. S. R. D. Jayaprasanna, ‘A Framework for Software Architecture Visualization and Evaluation’.
  21. Z. Tuasamu et al., ‘Analisis Sistem Informasi Akuntansi Siklus Pendapatan Menggunakan DFD Dan Flowchart Pada Bisnis Porobico’, 2023.
  22. Rony Setiawan, ‘Black Box Testing Untuk Menguji Perangkat Lunak’, dicoding.com. Accessed: Jun. 20, 2024. Available: https://www.dicoding.com/blog/black-box-testing/
  23. H. Bhasin, E. Khanna, M. Tech Scholar, and P. Sudha, ‘Black Box Testing based on Requirement Analysis and Design Specifications’, 2014.
  24. M. Alvian Kosim, S. Restu Aji, and M. Darwis, ‘Pengujian Usability Aplikasi PeduliLindungi Dengan Metode System Usability Scale (SUS)’, Jurnal Sistem Informasi dan Sains Teknologi, vol. 4, no. 2, 2022.
  25. F. Assiri, R. Alshanbari, E. Algamdi, A. Alahmadi, A. Aljehani, and R. Alahmari, ‘Congenital Heart Defect Monitoring System for Children using Internet of Things’, 2017.
Index Terms

Computer Science
Information Sciences

Keywords

Learning Application Mobile Cryptography Cipher Feedback Waterfall