Implementasi Pembelajaran Coding Dan Kriptografi Pada Pesan Digital di SMA Negeri 2 Mataram

Authors

  • Maulani Rizqi Universitas Diponegoro
  • Intan Nadilah Universitas Mataram
  • Ahmadil Hamdi Universitas Mataram
  • Nikken Prima Puspita Universitas Diponegoro
  • I Gede Adhitya Wisnu Wardhana Universitas Mataram

DOI:

https://doi.org/10.62383/aksisosial.v2i4.2641

Keywords:

Cryptography, Coding, Security, Encryption, Literacy

Abstract

This community service activity aims to increase the understanding of students at State Senior High School 2 Mataram regarding information security by introducing the concepts of coding and cryptography in digital messages. The rapid use of messaging applications among teenagers makes students increasingly vulnerable to cyber threats, necessitating education on how data protection works in online communication. This program is implemented using a descriptive method consisting of planning, implementation, and evaluation stages. The material covered includes basic cryptography concepts, end-to-end encryption mechanisms, and the practical process of the Diffie–Hellman key exchange thru the interactive simulation "Alice and Bob." Learning is designed contextually and participatively so that students can connect theory with the digital applications they use every day. The evaluation results showed an improvement in students' understanding, reflected in their active participation, ability to answer questions, and adequate post-test scores. This activity not only strengthens digital security literacy but also raises students' awareness of the importance of protecting personal data in online communication. This program is expected to be the beginning of more sustainable digital security learning development in the school environment.

References

Amin, M. M. (2016). Implementasi kriptografi klasik pada komunikasi berbasis teks. Jurnal Pseudocode, 3(2), 127196.

Ashish, K., Bolisetty, Y., Singh, D., & Kaur, A. (2024). Encryption, Privacy, and Usability: A Comparative Evaluation of Leading Secure Messaging Platforms. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 10, 551–555.

Gegenhuber, G. K., Günther, M., Maier, M., Judmayer, A., Holzbauer, F., Frenzel, P. É., & Ullrich, J. (2024). Careless Whisper: Exploiting Stealthy End-to-End Leakage in Mobile Instant Messengers. ArXiv Preprint ArXiv:2411.11194.

Kusuma, I. J. (2017). Analisis Teknik Steganografi Pada Audio Mp3 Menggunakan Metode Parity Coding Dan Enkripsi Cipher Transposition. Jurnal Elektronik Sistem Informasi Dan Komputer, 3(2), 1–8.

Lelloltery, Y., Kanety, D. H., Nanulaita, M., Warsoy, L., Lico, G. J., Mauday, F., Mehmorliay, B., Porloy, C., Pooroe, D. F., & Kilikily, C. C. (2023). Pengabdian mahasiswa melalui program bimbingan belajar pada siswa SD Inpres Werwaru. Jurnal Masyarakat Madani Indonesia, 2(3), 221–227.

Lestari, S. P., Fadlan, H. N., Purba, R. A., & Gunawan, I. (2022). Realisasi Kriptografi Pada Fitur Enkripsi End-To-End Pesan Whatsapp. Jurnal Media Informatika, 4(1), 1–8.

Pancoro, W. (2024). Securing Text Messages Using E2EE (End-To-End Encryption) on Instant Messaging Applications. International Journal of Information Technology and Business, 6(2), 17–23.

Perkasa, M. J. P., Ramdan, H. M., Maliki, A. J., & Somantri. (2025). Implementation of Secure End-to-End Encrypted Chat Application Using Diffie–Hellman Key Exchange and AES-256 in a Microservice Architecture. Engineering Proceedings, 107(1), 98.

Pongsitammu, V., Simatupang, A. R. Y., Annura, D., Dachi, Y. S., & Harries, D. R. (2023). KEAMANAN KRIPTOSISTEM MODERN BERDASARKAN ALGORITMA KRIPTOGRAFI KUNCI PUBLIK. JURNAL SITEBA, 2(1).

Ramalinda, D., & Raharja, A. R. (2024). Strategi Perlindungan Data Menggunakan Sistem Kriptografi Dalam Keamanan Informasi. Journal of International Multidisciplinary Research. Https://Doi. Org/10.62504/Jimr679.

Sari, E. I. (2018). Perancangan Aplikasi Kriptografi Asimetris Dengan Menerapkan Metode Elliptic Curve Cryptography. Media Informasi Analisa Dan Sistem, 3(1), 24–28.

Shirvanian, M., Saxena, N., & George, J. J. (2017). On the pitfalls of end-to-end encrypted communications: A study of remote key-fingerprint verification. Proceedings of the 33rd Annual Computer Security Applications Conference, 499–511.

Siboro, A. M., Wahidah, F. M., Putra, L. R. W., Lestari, S. T., Putri, S., Pratama, R. B., & Wardhana, I. G. A. W. (2024). Meningkatkan Keterampilan dan Kreativitas Siswa Menggunakan Implementasi Teori Domino di SMAN 1 Batukliang Utara. Pemberdayaan Masyarakat: Jurnal Aksi Sosial, 1(3), 131–141.

Suryadi, S. (2015). Peranan perkembangan teknologi informasi dan komunikasi dalam kegiatan pembelajaran dan perkembangan dunia pendidikan. Informatika, 3(3), 133–143.

Totnay, E. C. T. T., Seran, M. M., Tusala, V. V. Y., Mau, S. T., & To, H. L. (2025). Enkripsi End-to-End pada Aplikasi WhatsApp Menggunakan Metode AES-256. Blantika: Multidisciplinary Journal, 3(7), 1048–1054.

Downloads

Published

2025-12-29

How to Cite

Maulani Rizqi, Intan Nadilah, Ahmadil Hamdi, Nikken Prima Puspita, & I Gede Adhitya Wisnu Wardhana. (2025). Implementasi Pembelajaran Coding Dan Kriptografi Pada Pesan Digital di SMA Negeri 2 Mataram. Pemberdayaan Masyarakat : Jurnal Aksi Sosial, 2(4), 207–219. https://doi.org/10.62383/aksisosial.v2i4.2641

Most read articles by the same author(s)