Implementation of Encrypt National ID Card in Sinovi Application Use Waterfall Methodology

Authors

  • Teguh Rijanandi Software Engineering, Fakultas Informatika, Institut Teknologi Telkom Purwokerto
  • Ayu Silvia Sistem Informasi, Fakultas Informatika, Institut Teknologi Telkom Purwokerto
  • Bintang Abillah Safna Software Engineering, Fakultas Informatika, Institut Teknologi Telkom Purwokerto
  • Rima Dias Ramadhani Sains Data, Fakultas Informatika, Institut Teknologi Telkom Purwokerto

DOI:

https://doi.org/10.31004/riggs.v1i2.15

Keywords:

AES 256, Sinovi, KTP, Waterfall Methodology

Abstract

In this era of increasingly rapid technology, the development of information systems is also growing rapidly, because information systems provide what users need. Information is a very valuable thing. When information or data falls into irresponsible hands, it will bring disaster to the owner, and there have been many cases of data leaks in the past that have harmed several parties. There are various ways to protect data or information. Therefore, data security techniques are needed, the message security process is very diverse, including using cryptography. Cryptography aims to scramble messages so that they are difficult to read by unauthorized parties. In this study, we will use the AES 256 encryption method with the waterfall research method to secure KTP images on the Sinovi application, Sinovi is a copyright registration application at the Telkom Institute of Technology Purwokerto. The results of this study are the AES method will convert data or information in the form of plain text into cipher-text then stored in a file to replace the image file so that in this way the image cannot be viewed directly because it must pass the decryption technique first and the research data will be presented. in a table of blackbox testing. It is hoped that a security system like this can protect data from unauthorized parties and further research is expected to have research that tests AES 256 with different methods. https://github.com/teguh02/T-Encryption

Downloads

Download data is not yet available.

References

H. M. Mohammad and A. A. Abdullah, “Enhancement process of AES: a lightweight cryptography algorithm-AES for constrained devices,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 20, no. 3, pp. 551–560, 2022, doi: 10.12928/TELKOMNIKA.v20i3.23297.

D. Darwis, R. Prabowo, and N. Hotimah, “Kombinasi Gifshuffle, Enkripsi AES dan Kompresi Data Huffman untuk Meningkatkan Keamanan Data,” Jurnal Teknologi Informasi dan Ilmu Komputer, vol. 5, no. 4, p. 389, Oct. 2018, doi: 10.25126/jtiik.201854727.

M. A. Budiman, D. Rachmawati, and Jessica, “Implementation of Super-Encryption with Trithemius Algorithm and Double Transposition Cipher in Securing PDF Files on Android Platform,” in Journal of Physics: Conference Series, Mar. 2018, vol. 978, no. 1. doi: 10.1088/1742-6596/978/1/012088.

D. R. Destriani Firmansyah Putri Universitas Pembangunan Nasional Veteran Jakarta Jalan Fatmawati, P. Labu, J. Selatan, D. Jakarta, and M. R. Helmi Fahrozi Universitas Pembangunan Nasional Veteran Jakarta Jalan Fatmawati, “UPAYA PENCEGAHAN KEBOCORAN DATA KONSUMEN MELALUI PENGESAHAN RUU PERLINDUNGAN DATA PRIBADI (STUDI KASUS E-COMMERCE BHINNEKA.COM),” 2021. [Online]. Available: https://tirto.id/jumlah-pelanggan-e-commerce-tercatat-meningkat-383-selama-

D. Komalawati, M. Dewi, M. R. Dan, R. D. Kartika, and I. Artikel, “KEJUTAN PULUHAN MILIAR TOKOPEDIA DITENGAH KASUS KEBOCORAN DATA,” Jurnal Syntax Admiration, vol. 2, no. 1, 2021.

K. Dio Ramadi Natha, I. Nyoman Putu Budiartha, and N. Gusti Ketut Sri Astiti, “PERLINDUNGAN HUKUM ATAS KEBOCORAN DATA PRIBADI KONSUMEN PADA PERDAGANGAN ELEKTRONIK LOKAPASAR (MARKETPLACE),” vol. 3, no. 1, pp. 2746–5039, doi: 10.22225/jph.3.1.4674.143-148.

T. Hidayat, “ENCRYPTION SECURITY SHARING DATA CLOUD COMPUTING BY USING AES ALGORITHM: A SYSTEMATIC REVIEW,” vol. 2, no. 2, 2019.

X. Chen, “Implementing AES Encryption on Programmable Switches via Scrambled Lookup Tables,” in Proceedings of the 2020 ACM SIGCOMM Workshop on Secure Programmable Network Infrastructure, SPIN 2020, Aug. 2020, pp. 8–14. doi: 10.1145/3405669.3405819.

T. Hidayat and R. Mahardiko, “A Systematic Literature Review Method On AES Algorithm for Data Sharing Encryption On Cloud Computing,” International Journal of Artificial Intelligence Research, vol. 4, no. 1, Apr. 2020, doi: 10.29099/ijair.v4i1.154.

T. Rijanandi et al., “Web-Based Application with SDLC Waterfall Method on Population Administration and Registration Information System (Case Study: Karangklesem Village, Purwokerto),” Jurnal Teknik Informatika (JUTIF), vol. 3, no. 1, pp. 99–104, 2022, doi: 10.20884/1.jutif.2022.3.1.145.

W. Steven Dharmawan et al., “Penerapan Metode SDLC Waterfall Dalam Perancangan Sistem Informasi Administrasi Keuangan Berbasis Desktop,” vol. VI, no. 2, 2018.

R. F. Ramadhan and R. Mukhaiyar, “Penggunaan Database Mysql dengan Interface PhpMyAdmin sebagai Pengontrolan Smarthome Berbasis Raspberry Pi,” JTEIN: Jurnal Teknik Elektro Indonesia, vol. 1, no. 2, pp. 129–134, 2020, doi: 10.24036/jtein.v1i2.55.

I. M. Sudana, N. Qudus, and S. E. Prasetyo, “Implementation of PHPMailer with SMTP protocol in the development of web-based e-learning prototype,” in Journal of Physics: Conference Series, Nov. 2019, vol. 1321, no. 3. doi: 10.1088/1742-6596/1321/3/032027.

S. Hartati and Salamudin, “Membangun Katalog Online Toko Plastik Pedoman Menggunakan PHP Dan MYSQL,” Jurnal Informatika, vol. 9, no. 1, pp. 75–87, 2020, [Online]. Available: http://www.ejournal.lembahdempo

“ANALYZE MULTIPLE CHOICE ITEMS USING PHP PROGRAMMING LANGUAGE (Case Study: SMAN 1 Klari Karawang)”, doi: 10.37200/IJPR/V24I7/PR270390.

A. M. S. Huda and Y. Fernando, “E-Ticketing Penjualan Tiket Event Musik Di Wilayah Lampung Pada Karcismu Menggunakan Library Reactjs,” Jurnal Teknologi dan Sistem Informasi (JTSI), vol. 2, no. 1, pp. 96–103, 2021, [Online]. Available: http://jim.teknokrat.ac.id/index.php/JTSI

I. Dewa, P. Gede, W. Putra, and D. W. Aristana, “PERANCANGAN DESAIN RUANGAN DATA CENTER MENGGUNAKAN STANDAR TIA-942 (STUDI KASUS : UPT SIMJAR STMIK STIKOM INDONESIA),” Online, 2019. [Online]. Available: http://jurnal.stiki-indonesia.ac.id/index.php/jurnalresistor

R. Nuraini, D. Alamsyah, R. S. Septarini, A. Aristo, and J. Sinlae, “Completion of Multi-Criteria Decision Making Using the Weighted Product Method on the Server Maintenance Vendor Selection System,” 2022.

F. Adline, T. Tobing, and J. R. Tambunan, “Analisis Perbandingan Efisiensi Algoritma Brute Force dan Divide and Conquer dalam Proses Pengurutan Angka,” 52 ULTIMATICS, vol. XII, no. 1, 2020.

D. Rachmawati, M. A. Budiman, and F. Atika, “PDF file encryption on mobile phone using super-encryption of Variably Modified Permutation Composition (VMPC) and two square cipher algorithm,” in Journal of Physics: Conference Series, Mar. 2018, vol. 978, no. 1. doi: 10.1088/1742-6596/978/1/012115.

Z. Abidin, A. Wijaya, and D. Pasha, “Aplikasi Stemming Kata Bahasa Lampung Dialek Api Menggunakan Pendekatan Brute-Force dan Pemograman C#,” JURNAL MEDIA INFORMATIKA BUDIDARMA, vol. 5, no. 1, p. 1, Jan. 2021, doi: 10.30865/mib.v5i1.2483.

R. Kesuma Dinata, N. Hasdyna, and R. Mahendra, “KOMBINASI ALGORITMA BRUTE FORCE DAN STEMMING PADA SISTEM PENCARIAN MASHDAR,” 2020.

A. Susanto, “Image encryption using vigenere cipher with bit circular shift,” 2021.

N. Rachmat and Samsuryadi, “Performance analysis of 256-bit aes encryption algorithm on android smartphone,” in Journal of Physics: Conference Series, Apr. 2019, vol. 1196, no. 1. doi: 10.1088/1742-6596/1196/1/012049.

Downloads

Published

01-01-2023

How to Cite

[1]
T. Rijanandi, A. Silvia, B. Abillah Safna, and R. Dias Ramadhani, “Implementation of Encrypt National ID Card in Sinovi Application Use Waterfall Methodology”, RIGGS, vol. 1, no. 2, pp. 11–18, Jan. 2023.

Issue

Section

Articles