Pengembangan Aplikasi Computer Based Test dengan Protokol Two Central Facilities
DOI:
https://doi.org/10.14421/jiska.2020.43-02Abstract
The Indonesian government has issued a policy on Ujian Nasional Berbasis Komputer (UNBK), or it can be called CBT (Computer Based Test). In this study is the development of the CBT system using the Two Central Facilities protocol, which consists of the Central Legitimization Agency (CLA) and the Central Tabulating Facilities (CTF). In developing this CBT system, CLA is used to authenticate the examinees, while CTF is used to provide questions and calculation of exam answers. To maintain security added encryption using the RSA Algorithm (Rivest-Shamir-Adleman) which functions to convert data into ciphertext. From the results of functional trials, this system has succeeded in applying the Two Central Facilities protocol. This system has been connected to the CLA and CTF servers and all data has been successfully encrypted. For this reason, in the future schools will be endeavored to implement the development of the CBT system to avoid fraud.
References
Bishop, M. (2003). Computer Security Art and Science. Pearson Education, Inc. Boston.
Firdaus, C., Wahyudin, & Nugroho, E. P. (2017). Monitoring System with Two Central Facilities Protocol. Jurnal UPI, 1.
Kemendikbud. (2019, November 19). Tentang UNBK. Retrieved from Kemendikbud UNBK: https://ubk.kemdikbud.go.id/
Muharram, A. T., & Satrya, F. (2015). Rancang Bangun Sistem E-Voting Menggunakan Protokol Two Central Facilities. Jurnal Informatik, 37.
Nisha, S., & Farik, M. (2017). RSA Public Key Cryptography Algorithm – A Review. IJSTR, 187.
Poggio, J., Glassnapp, D., & Yang, X. (2005). A Com-parative Evaluation of Score Results from Com-puterized and Paper & Pencil Mathematics Test-ing in a Large Scale State Assessment Program. The Journal of Technology, Learning, and As-sessment, 4-30.
Saranya, Vinothini, & Vasumathi. (2014). A Study on RSA Algorithm for Cryptography. IJCSIT, 5708.
Schneir, B. (1996). Applied Cryptography. Ed ke-2, Jon Wiley & Sons.
Sireesha, J., & Chakchai, S.-I. (2005). Secure Virtual Election Booth with Two Central Facilities. Washington: Department of Computer Science Washington University.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms as stated in http://creativecommons.org/licenses/by-nc/4.0
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.