Mathematics in Cryptography and Its Applications in Cybersecurity
Uha Isnaini(1*), Nurul Qomariasih(2), Amiruddin Amiruddin(3), Made Tantrawan(4), Arizal Arizal(5), Iwan Ernanto(6), Nadia Paramita Retno Adiati(7), Indarsih Indarsih(8), Ray Novita Yasa(9), Indah Emilia Wijayanti(10), Santi Indarjani(11), Salmah Salmah(12), Septia Ulfa(13), Ari Dwi Hartanto(14), Fetty Amelia(15)
(1) Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Gadjah Mada, Yogyakarta, Indonesia
(2) Department of Cryptographic Engineering, Politeknik Siber dan Sandi Negara, Bogor, Indonesia
(3) Department of Cyber Security Engineering, Politeknik Siber dan Sandi Negara, Bogor, Indonesia
(4) Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Gadjah Mada, Yogyakarta, Indonesia
(5) Department of Cyber Security Engineering, Politeknik Siber dan Sandi Negara, Bogor, Indonesia
(6) Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Gadjah Mada, Yogyakarta, Indonesia
(7) Department of Cryptographic Engineering, Politeknik Siber dan Sandi Negara, Bogor, Indonesia
(8) Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Gadjah Mada, Yogyakarta, Indonesia
(9) Department of Cryptographic Engineering, Politeknik Siber dan Sandi Negara, Bogor, Indonesia
(10) Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Gadjah Mada, Yogyakarta, Indonesia
(11) Department of Cryptographic Engineering, Politeknik Siber dan Sandi Negara, Bogor, Indonesia
(12) Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Gadjah Mada, Yogyakarta, Indonesia
(13) Department of Cyber Security Engineering, Politeknik Siber dan Sandi Negara, Bogor, Indonesia
(14) Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Gadjah Mada, Yogyakarta, Indonesia
(15) Department of Cryptographic Engineering, Politeknik Siber dan Sandi Negara, Bogor, Indonesia
(*) Corresponding Author
Abstract
The growing prevalence of cyber threats and attacks poses significant risks to the security of personal data and the integrity of sensitive information worldwide. Cryptography plays a vital role in establishing strong cybersecurity defenses, and the development of robust cryptographic algorithms is essential for protecting data against cyber-attacks. This workshop aimed to enhance participants’ understanding of the mathematical foundations of cryptographic algorithms and equip them with practical skills to identify and mitigate cyber threats. It also introduced innovative educational tools, including an Augmented Reality (AR) application for teaching classical cryptography and a Game-Based URL Phishing Education application. A total of 110 participants attended and completed the pre-test. The post-test measured knowledge gained during the workshop, and an accompanying survey gathered feedback on its effectiveness and identified areas for improvement. Overall, the workshop successfully achieved its objectives by educating participants on cryptography in the Internet of Things (IoT), increasing awareness of social engineering, introducing cryptographic tools from ancient to modern times, and exploring the principles of quantum cryptography.
Keywords
Full Text:
PDFReferences
Bada, M., & Nurse, J. R. C. (2019). Developing cybersecurity education and awareness programmes for small-and medium-sized enterprises (SMEs). Information & Computer Security, 27, 393-410. https://doi.org/10.1108/ICS-07-2018-0080 Billinghurst, M. & Duenser, A. (2012). Augmented reality in the classroom. Computer, 45, 56 – 63. https://doi. org/10.1109/MC.2012.111 Daniel, R. M., Rajsingh, E. B., & Silas, S. (2019). An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks. Journal of Information Security and Applications, 47, 156-172. https://doi.org/10.101 6/j.jisa.2019.05.003 Kizielewicz, B., & Kołodziejczyk, J. (2020). Effects of the selection of characteristic values on the accuracy of results in the COMET method. Procedia Computer Science, 176, 3581-3590. https://doi.org/10.101 6/j.procs.2020.09.028 Koblitz, N. (1994). A course in number theory and cryptography. Springer Science & Business Media. Lee, D., Rothstein, R., Dunford, A., Berger, E., Rhoads, J. F., & DeBoer, J. (2021). “Connecting online”: The structure and content of students’ asynchronous online networks in a blended engineering class. Computers & Education, 163, 104082. https://doi.org/10.1016/ j.compedu.2020.104082 Martín-Gutiérrez, J., Mora, C. E., Añorbe-Díaz, B., & González-Marrero, A. (2017). Virtual technologies trends in education. Eurasia Journal of Mathematics, Science and Technology Education, 13, 469-486. https: //doi.org/10.12973/eurasia.2017.00626a Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., & Downs, J. (2010). Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions. CHI ’10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 373-382. https://doi.org/10.1145/1753326.17 53383 von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97- 102.https://doi.org/10.1016/j.cose.2013.04.0 04 Walpole, R. E. (2012). Pengantar statistika (9th ed.). Jakarta: PT Gramedia Utama.
Article Metrics
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Jurnal Pengabdian kepada Masyarakat (Indonesian Journal of Community Engagement)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Jurnal Pengabdian kepada Masyarakat (Indonesian Journal of Community Engagement) ISSN (print) 2460-9447, ISSN (online) 2541-5883



