Strategi Otentikasi Dokumen Pada Email Menggunakan Digital Signature dengan Algoritma Schnorr


Authors

  • Lisda Juliana Pangaribuan Universitas Mandiri Bina Prestasi, Medan, Indonesia
  • Catra Indra Cahyadi Politeknik Penerbangan Medan, Medan, Indonesia
  • Jaidup Banjarnahor Universitas Mandiri Bina Prestasi, Medan, Indonesia
  • Berlin Barus Universitas Mandiri Bina Prestasi, Medan, Indonesia
  • Bertha N Siahaan Mandiri Bina Prestasi, Medan, Indonesia

DOI:

https://doi.org/10.30865/klik.v3i4.679

Keywords:

Digital Signature; Schnorr Methode; Cryptography; Autentication; Hash SHA-1

Abstract

Email is an internet facility for sending electronic mail. Although there is a webmail that provides standard security but for e-mail attachment documents when sending e-mail there are lots of eavesdropping, forgery, infiltration,and spamming so needed security of email. Authentication is identification carried out by each communicating party so sender and recipient of information trust each other. Although message authentication has been carried out, it is still possible for both parties to attack each other. This study aims to apply digital signatures in testing the integrity and authentication of document attachments email using the schnorr algorithm. SHA-1 hash function is used for verification, Results show that contents of email attachment will produce a different Message Digest if  prime numbers are different, so cryptanalysts can’t solve it. Differences in Message Digest occur because different prime numbers cause differences in private keys and public keys.  Private key and public key pairs are synchronous so sender and recipient are verified correctly. If there are changes or removed just one character from contents of document will result in a very significant Message Digest change. If someone changes contents of document or key, so verification process to be incorrect and recipient of  information knows that document he received is no longer valid. Schnorr method is a strategy to provide document attachment security in emails that is better than security applied to standard emails

Downloads

Download data is not yet available.

References

A. Supriyanto, “Pemakaian Kriptografi Kunci Publik Untuk Proses Enkripsi Dan Tandatangan Digital Pada Dokumen E-Mail,” Din. Inform., no. 1, 2009.

L. J. Pangaribuan and D. Sitanggang, “KEAMANAN PESAN WHATSAPP MENGGUNAKAN KRIPTOGRAFI ALGORITMA GOVERNMENT STANDARD ( GOST ),” vol. 2, no. 1, pp. 210–217, 2022.

L. J. Pangaribuan, “KRIPTOGRAFI MODERN KUNCI ASIMETRIS DENGAN METODE RSA UNTUK KEAMANAN PESAN DALAM E-MAIL,” in Konferensi Nasional Pengembangan Teknologi Informasi dan Komunikasi (KETIK), 2014, pp. 153–159.

M. S. Ramadhan and F. P. Ariyani, “Peningkatan Keamanan Login Website Dengan Implementasi One Time Password Menggunakan Algoritma Sha1 Dan Md5 Berbasis Mobile,” Skanika, vol. 1, no. 2, pp. 689–696, 2018.

L. Juliana Pangaribuan and F. Haris Simbolon, “KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) KRIPTOGRAFI HYBRIDA MENGGUNAKAN ALGORITMA HILL CIPHER DAN ALGORITMA RSA UNTUK KEAMANAN PENGIRIMAN INFORMASI PADA EMAIL,” in KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), 2017. [Online]. Available: http://ejurnal.stmik-budidarma.ac.id/index.php/komik

L. J. Pangaribuan, “Kriptografi Hybrida Agloritma Hill Cipher Dan Rivest Shamir Adleman (RSA) Sebagai Pengembangan Kriptografi Kunci Simetris (Studi Kasus?: Nilai Mahasiswa Amik Mbp),” J. Teknol. Inf. Dan Komun., vol. 7, no. 1, pp. 11–26, 2018.

L. J. Pangaribuan, “IMPLEMENTASI KRIPTOGRAFI MENGGUNAKAN METODE HILL CIPHER,” in Seminar Nasional Inovasi dan Teknologi Informasi (SNITI), 2014, vol. 1, pp. 10–11.

Y. Anshori, A. Y. Erwin Dodu, and D. M. P. Wedananta, “Implementasi Algoritma Kriptografi Rivest Shamir Adleman (RSA) pada Tanda Tangan Digital,” Techno.Com, vol. 18, no. 2, pp. 110–121, 2019, doi: 10.33633/tc.v18i2.2166.

Y. Fitriyah, “Analisis Tingkat Kesiapan implmentasi Tanda Tangan Digital Untuk Autentikasi Dokumen Rekam Medis ELektronik di Instalasi Rawat Jalan RSUD Kota Yogyakarta,” J. Inf. Syst. Public Heal., vol. 7, no. 2, p. 53, 2022, doi: 10.22146/jisph.73666.

Y. P. Dwi Puspitasari*, “Kriptografi Rivest Shamir Adleman (RSA) pada Tanda Tangan Digital,” in Prosiding Matematika, 2020, pp. 14–20.

A. B. Ronald Makaleo Tandiabang, Tomy Handaka Patria, “Otentikasi Dokumen Elektronik Menggunakan Tanda Tangan Digital,” Tanda Tangan Digit., p. 3, 2019.

A. Lorien and T. Wellem, “Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no. 4, pp. 663–671, 2021, doi: 10.29207/resti.v5i4.3316.

I. Silaban, P. S. Ramadhan, and D. H. Pane, “Implementasi Algoritma Schnorr Untuk Tanda Tangan Digital Pada Surat Pendaftaran Online PKBM Hanuba Medan,” J-SISKO TECH (Jurnal Teknol. Sist. Inf. dan Sist. Komput. TGD), vol. 5, no. 1, p. 25, 2022, doi: 10.53513/jsk.v5i1.3827.

H. F. Isnaini, K. Karyati, and J. P. Matematika, “Penerapan Skema Tanda Tangan Schnorr pada Pembuatan Tanda Tangan Digital Implementation of Schnorr Signature Scheme in The Form of Digital Signature,” Pythagoras J. Pendidik. Mat, vol. 12, no. 1, pp. 57–64, 2017.

E. Cahyo Prabowo and I. Afrianto, “Penerapan Digital Signature Dan Kriptografi PadaOtentikasi Sertifikat Tanah Digital - Teknik Informatika Universitas Komputer Indonesia,” J. Ilm. Komput. dan Inform., vol. 6, no. 2, 2017.

T. Wang, L. Song, “An Improved Digital Signature Algorithm and Authentication Protocols in Cloud Platform. PROTOCOL,” IEEE Int. Conf. Smart Cloud, New York, NY, USA, 2016.

M. Mesran, M. Syahrizal, and R. Rahim, “Enhanced security for data transaction with public key Schnorr authentication and digital signature protocol,” ARPN J. Eng. Appl. Sci., vol. 13, no. 11, pp. 3839–3846, 2018.

E. Wahyudi, M. M. Efendi, M. Subli, A. Subki, and M. R. Alfian, “Penerapan Digital Signature Scheme Dengan Metode Schnorr Authentication,” Explore, vol. 10, no. 1, p. 23, 2020, doi: 10.35200/explore.v10i1.360.

R. A. Saputra and A. S. Purnomo, “Implementasi Algoritma Schnorr Untuk Tanda Tangan Digital,” JMAI (Jurnal Multimed. Artif. Intell., vol. 2, no. 1, pp. 21–26, 2018, doi: 10.26486/jmai.v2i1.69.

R. Pavuluru, “Miller-Rabin,” 2015.

Z. WANG, “Methods of Primality Testing,” MIT Undergrad. J. Math., vol. 1, no. January, pp. 133–142, 2021, [Online]. Available: https://www.researchgate.net/profile/Zixing-Wang-5


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Strategi Otentikasi Dokumen Pada Email Menggunakan Digital Signature dengan Algoritma Schnorr

Dimensions Badge

ARTICLE HISTORY


Published: 2023-02-28
Abstract View: 577 times
PDF Download: 499 times

How to Cite

Pangaribuan, L. J., Catra Indra Cahyadi, Jaidup Banjarnahor, Berlin Barus, & Bertha N Siahaan. (2023). Strategi Otentikasi Dokumen Pada Email Menggunakan Digital Signature dengan Algoritma Schnorr. KLIK: Kajian Ilmiah Informatika Dan Komputer, 3(4), 384-392. https://doi.org/10.30865/klik.v3i4.679

Most read articles by the same author(s)