Middle Square Method Analysis of Number Pseudorandom Process

Authors

  • Arif Budiman Universitas Budi Darma, Medan
  • Efori Bulolo Universitas Budi Darma, Medan
  • Imam Saputra Universitas Budi Darma, Medan

DOI:

https://doi.org/10.30865/ijics.v4i2.1386

Keywords:

Middle Square, Pseudorandom Number

Abstract

Random numbers can be generated from a calculation of mathematical formulas. Such random numbers are often referred to as pseudo random numbers, random numbers are used for various algorithms, especially cryptographic algorithms such as AES, RSA, IDEA, GOST that require the use of Middle-Square Method random numbers which is very useful for adding research references to algorithms concerning random number generator and better understand how random numbers are generated using the Middle-Square Method algorithm. Both data collection and report making as for the objectives achieved in the form of understanding random numbers and knowing the algorithm process, compile a program designed to be used as an alternative to random numbers for various purposes, especially in cryptographic algorithms.

Author Biographies

Arif Budiman, Universitas Budi Darma, Medan

Teknik Informatika

Efori Bulolo, Universitas Budi Darma, Medan

Teknik Informatika

Imam Saputra, Universitas Budi Darma, Medan

Teknik Informatika

References

Yosua P.W Simare mare ,â€Middle Square Method â€, Penerbit Andi, Jogyakarta, Edisi II, 2013.

Primananda Arif Aditya,†Dasar-dasar Pemrograman Database Destop dengan Visual Net C ++ 2008â€, Penerbit PT. Elex MediA Komputino, Jakarta 2013.

Wikipedia, The Free Encyclopedia [Online],Available :http://en.wikipedia.org John von Neuman.

Abdul Kadir ( 2003 : 12 )

(sumber:http://thesis.binus.ac.id/asli/Lampiran/2006-2-00821-KA Lampiran.pdf/09/06)

(Sumber:http://www.wiley.com/college/busin/icmis/oakman/outline/chap05/slides/symbols.html/09/06).

Downloads

Published

2020-09-06

How to Cite

Budiman, A., Bulolo, E., & Saputra, I. (2020). Middle Square Method Analysis of Number Pseudorandom Process. The IJICS (International Journal of Informatics and Computer Science), 4(2), 35–38. https://doi.org/10.30865/ijics.v4i2.1386