Strategi Otentikasi Dokumen Pada Email Menggunakan Digital Signature dengan Algoritma Schnorr
DOI:
https://doi.org/10.30865/klik.v3i4.679Keywords:
Digital Signature; Schnorr Methode; Cryptography; Autentication; Hash SHA-1Abstract
Email is an internet facility for sending electronic mail. Although there is a webmail that provides standard security but for e-mail attachment documents when sending e-mail there are lots of eavesdropping, forgery, infiltration,and spamming so needed security of email. Authentication is identification carried out by each communicating party so sender and recipient of information trust each other. Although message authentication has been carried out, it is still possible for both parties to attack each other. This study aims to apply digital signatures in testing the integrity and authentication of document attachments email using the schnorr algorithm. SHA-1 hash function is used for verification, Results show that contents of email attachment will produce a different Message Digest if prime numbers are different, so cryptanalysts can’t solve it. Differences in Message Digest occur because different prime numbers cause differences in private keys and public keys. Private key and public key pairs are synchronous so sender and recipient are verified correctly. If there are changes or removed just one character from contents of document will result in a very significant Message Digest change. If someone changes contents of document or key, so verification process to be incorrect and recipient of information knows that document he received is no longer valid. Schnorr method is a strategy to provide document attachment security in emails that is better than security applied to standard emails
Downloads
References
A. Supriyanto, “Pemakaian Kriptografi Kunci Publik Untuk Proses Enkripsi Dan Tandatangan Digital Pada Dokumen E-Mail,” Din. Inform., no. 1, 2009.
L. J. Pangaribuan and D. Sitanggang, “KEAMANAN PESAN WHATSAPP MENGGUNAKAN KRIPTOGRAFI ALGORITMA GOVERNMENT STANDARD ( GOST ),” vol. 2, no. 1, pp. 210–217, 2022.
L. J. Pangaribuan, “KRIPTOGRAFI MODERN KUNCI ASIMETRIS DENGAN METODE RSA UNTUK KEAMANAN PESAN DALAM E-MAIL,” in Konferensi Nasional Pengembangan Teknologi Informasi dan Komunikasi (KETIK), 2014, pp. 153–159.
M. S. Ramadhan and F. P. Ariyani, “Peningkatan Keamanan Login Website Dengan Implementasi One Time Password Menggunakan Algoritma Sha1 Dan Md5 Berbasis Mobile,” Skanika, vol. 1, no. 2, pp. 689–696, 2018.
L. Juliana Pangaribuan and F. Haris Simbolon, “KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) KRIPTOGRAFI HYBRIDA MENGGUNAKAN ALGORITMA HILL CIPHER DAN ALGORITMA RSA UNTUK KEAMANAN PENGIRIMAN INFORMASI PADA EMAIL,” in KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), 2017. [Online]. Available: http://ejurnal.stmik-budidarma.ac.id/index.php/komik
L. J. Pangaribuan, “Kriptografi Hybrida Agloritma Hill Cipher Dan Rivest Shamir Adleman (RSA) Sebagai Pengembangan Kriptografi Kunci Simetris (Studi Kasus?: Nilai Mahasiswa Amik Mbp),” J. Teknol. Inf. Dan Komun., vol. 7, no. 1, pp. 11–26, 2018.
L. J. Pangaribuan, “IMPLEMENTASI KRIPTOGRAFI MENGGUNAKAN METODE HILL CIPHER,” in Seminar Nasional Inovasi dan Teknologi Informasi (SNITI), 2014, vol. 1, pp. 10–11.
Y. Anshori, A. Y. Erwin Dodu, and D. M. P. Wedananta, “Implementasi Algoritma Kriptografi Rivest Shamir Adleman (RSA) pada Tanda Tangan Digital,” Techno.Com, vol. 18, no. 2, pp. 110–121, 2019, doi: 10.33633/tc.v18i2.2166.
Y. Fitriyah, “Analisis Tingkat Kesiapan implmentasi Tanda Tangan Digital Untuk Autentikasi Dokumen Rekam Medis ELektronik di Instalasi Rawat Jalan RSUD Kota Yogyakarta,” J. Inf. Syst. Public Heal., vol. 7, no. 2, p. 53, 2022, doi: 10.22146/jisph.73666.
Y. P. Dwi Puspitasari*, “Kriptografi Rivest Shamir Adleman (RSA) pada Tanda Tangan Digital,” in Prosiding Matematika, 2020, pp. 14–20.
A. B. Ronald Makaleo Tandiabang, Tomy Handaka Patria, “Otentikasi Dokumen Elektronik Menggunakan Tanda Tangan Digital,” Tanda Tangan Digit., p. 3, 2019.
A. Lorien and T. Wellem, “Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no. 4, pp. 663–671, 2021, doi: 10.29207/resti.v5i4.3316.
I. Silaban, P. S. Ramadhan, and D. H. Pane, “Implementasi Algoritma Schnorr Untuk Tanda Tangan Digital Pada Surat Pendaftaran Online PKBM Hanuba Medan,” J-SISKO TECH (Jurnal Teknol. Sist. Inf. dan Sist. Komput. TGD), vol. 5, no. 1, p. 25, 2022, doi: 10.53513/jsk.v5i1.3827.
H. F. Isnaini, K. Karyati, and J. P. Matematika, “Penerapan Skema Tanda Tangan Schnorr pada Pembuatan Tanda Tangan Digital Implementation of Schnorr Signature Scheme in The Form of Digital Signature,” Pythagoras J. Pendidik. Mat, vol. 12, no. 1, pp. 57–64, 2017.
E. Cahyo Prabowo and I. Afrianto, “Penerapan Digital Signature Dan Kriptografi PadaOtentikasi Sertifikat Tanah Digital - Teknik Informatika Universitas Komputer Indonesia,” J. Ilm. Komput. dan Inform., vol. 6, no. 2, 2017.
T. Wang, L. Song, “An Improved Digital Signature Algorithm and Authentication Protocols in Cloud Platform. PROTOCOL,” IEEE Int. Conf. Smart Cloud, New York, NY, USA, 2016.
M. Mesran, M. Syahrizal, and R. Rahim, “Enhanced security for data transaction with public key Schnorr authentication and digital signature protocol,” ARPN J. Eng. Appl. Sci., vol. 13, no. 11, pp. 3839–3846, 2018.
E. Wahyudi, M. M. Efendi, M. Subli, A. Subki, and M. R. Alfian, “Penerapan Digital Signature Scheme Dengan Metode Schnorr Authentication,” Explore, vol. 10, no. 1, p. 23, 2020, doi: 10.35200/explore.v10i1.360.
R. A. Saputra and A. S. Purnomo, “Implementasi Algoritma Schnorr Untuk Tanda Tangan Digital,” JMAI (Jurnal Multimed. Artif. Intell., vol. 2, no. 1, pp. 21–26, 2018, doi: 10.26486/jmai.v2i1.69.
R. Pavuluru, “Miller-Rabin,” 2015.
Z. WANG, “Methods of Primality Testing,” MIT Undergrad. J. Math., vol. 1, no. January, pp. 133–142, 2021, [Online]. Available: https://www.researchgate.net/profile/Zixing-Wang-5
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Strategi Otentikasi Dokumen Pada Email Menggunakan Digital Signature dengan Algoritma Schnorr
ARTICLE HISTORY
How to Cite
Issue
Section
Copyright (c) 2023 Lisda Juliana Pangaribuan, Catra Indra Cahyadi, Jaidup Banjarnahor, Berlin Barus, Bertha N Siahaan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).















